A user receives a code on their mobile device after entering their password. This step is an example of ____________ in the authentication process.
- Biometric Authentication
- CAPTCHA
- Password Authentication
- Second Factor Authentication via Mobile Device
The described scenario represents Two-Factor Authentication (2FA) where the user combines something they know (password) with something they have (code on mobile device) for enhanced security. 2FA adds an extra layer of protection, reducing the risk of unauthorized access even if passwords are compromised. Recognizing the elements of 2FA is crucial for organizations implementing robust authentication mechanisms.__________________________________________________
Loading...
Related Quiz
- What mechanism does 'Cloud Access Security Broker' (CASB) use to enforce security policies?
- IPsec is a suite of protocols designed to secure what type of communication?
- After a data breach, a company revised its security policy to better protect sensitive data. This revision primarily focuses on ____________.
- In the context of security policy development, what is meant by the 'least privilege' principle?
- What is the main characteristic of an 'Advanced Persistent Threat' (APT)?