Home » Isaca » CISA » Which of the following refers to any authentication protocol that requires two independent ways to establish identity and privileges?
Which of the following refers to any authentication protocol that requires two independent ways to establish identity and privileges?
A. Strong-factor authentication
B. Two-factor authentication
C. Dual-password authentication
D. Two-passphrases authentication
E. Dual-keys authentication
F. Rich-factor authentication
Correct Answer: B
Explanation/Reference:
Two-factor authentication (T-FA) refers to any authentication protocol that requires two independent ways to establish identity and privileges. Common implementations of two-factor authentication use ‘something you know’ as one of the two factors, and use either ‘something you have’ or ‘something you are’ as the other factor. In fact, using more than one factor is also called strong authentication. On the other hand, using just one factor is considered by some weak authentication.
How To Pass CISA Exam?
Isaca CISA PDF dumps.
High quality CISA PDF and software. VALID exam to help you pass.
|
|
Download Printable PDF. VALID exam to help you PASS.
|
|