Common implementations of strong authentication may use which of the following factors in their authentication efforts (Choose three.):

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:December 21, 2021
  • Reading time:1 mins read
 

Last Updated on December 21, 2021 by InfraExam

Common implementations of strong authentication may use which of the following factors in their authentication efforts (Choose three.):

  • ‘something you know’
  • ‘something you have’
  • ‘something you are’
  • ‘something you have done in the past on this same system’
  • ‘something you have installed on this same system’
  • None of the choices.
Explanation: 
Two-factor authentication (T-FA) refers to any authentication protocol that requires two independent ways to establish identity and privileges. Common implementations of two-factor authentication use ‘something you know’ as one of the two factors, and use either ‘something you have’ or ‘something you are’ as the other factor. In fact, using more than one factor is also called strong authentication. On the other hand, using just one factor is considered by some weak authentication.
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments