Q:

Many applications use _________________, where two independent factors are used to identify a user

0

Many applications use _________________, where two independent factors are used to identify a user.


  1. Two-factor authentication
  2. Cross-site request forgery
  3. Cross-site scripting
  4. Cross-site scoring scripting

All Answers

need an explanation for this answer? contact us directly to get an explanation for this answer

(a).Two-factor authentication

need an explanation for this answer? contact us directly to get an explanation for this answer

total answers (1)

CRYPTOGRAPHY AND NETWORK SECURITY - NETWORK SECURITY CONCEPTS MCQ

This question belongs to these collections

Similar questions


need a help?


find thousands of online teachers now
Even with two-factor authentication, users may sti... >>
<< _________ is an attack which forces an end user to...