Which technology can be implemented as part of an authentication system to verify theidentification of employees?
- a smart card reader
- SHA-1 hash
- a virtual fingerprint
- a Mantrap
Explanation: A cybersecurity specialist must be aware of the technologies available that support the CIA triad.
Exam with this question: Final Quiz Cybersecurity Essentials
Please login or Register to submit your answer