What type of security technology is commonly active when security token generators are used?
A) Two-factor authentication
B) Anti-malware
C) Strong encryption
D) Hashing
E) How much power is created by those generators?
The answer: A) Two-factor authentication
Two-factor authentication consists of at least two factors of something you know (a password), something you have (a token generator), and something you are (fingerprint or other biometric).
![]() |
Want to know more? Watch “Security Fundamentals.”There are fundamental security techniques that every CompTIA A+ certified professional should know. In this video, you’ll learn about encryption technologies, data wiping, authentication technologies, and much more. |
Pages: 1 2