What type of security technology is commonly active when security token generators are used?
A) Two-factor authentication
C) Strong encryption
E) How much power is created by those generators?
The answer: A) Two-factor authentication
Two-factor authentication consists of at least two factors of something you know (a password), something you have (a token generator), and something you are (fingerprint or other biometric).
Want to know more? Watch “Security Fundamentals.”
There are fundamental security techniques that every CompTIA A+ certified professional should know. In this video, you’ll learn about encryption technologies, data wiping, authentication technologies, and much more.
Pages: 1 2