Which of the following technologies can be implemented as part of an authentication system to verify the identity of employees? (Select two correct answers)

IT Questions BankCategory: Cybersecurity EssentialsWhich of the following technologies can be implemented as part of an authentication system to verify the identity of employees? (Select two correct answers)

Which of the following technologies can be implemented as part of an authentication system to verify the identity of employees? (Select two correct answers)

  • A fingerprint
  • A SHA-1 hash
  • A smart card reader
  • A mantrap

Explanation: A username is the most common method used to identify a user. A username can be an alphanumeric combination, a personal identification number (PIN), a smart card or biometric — such as a fingerprint, retina scan or voice recognition.

More Questions: Cybersecurity Essentials: Course Final Exam Answers


guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x