Which of the following technologies can be implemented as part of an authentication system to verify the identity of employees? (Select two correct answers)

IT Questions BankCategory: Cybersecurity EssentialsWhich of the following technologies can be implemented as part of an authentication system to verify the identity of employees? (Select two correct answers)

Which of the following technologies can be implemented as part of an authentication system to verify the identity of employees? (Select two correct answers)

  • A fingerprint
  • A SHA-1 hash
  • A smart card reader
  • A mantrap

Explanation: A username is the most common method used to identify a user. A username can be an alphanumeric combination, a personal identification number (PIN), a smart card or biometric — such as a fingerprint, retina scan or voice recognition.

Exam with this question: Cybersecurity Essentials: Course Final Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments