CERTIFIED-IN-CYBERSECURITY · Question #521
CERTIFIED-IN-CYBERSECURITY Question #521: Real Exam Question with Answer & Explanation
The correct answer is C: Passwords, Tokens, and Biometrics. Authentication is the process of verifying the identity of a user or system, which is a critical step before granting access to a network or system (see the ISC2 Study Guide, Chapter 1, Module 1). Common authentication methods include passwords, tokens, and biometrics. For exampl
Question
What are three common methods of authentication?
Options
- APasswords, Tokens, and voice fingerprinting
- BPasswords, Memory Cards, and Smart Cards
- CPasswords, Tokens, and Biometrics
- DPasswords, Smart Cards, and retina scans
Explanation
Authentication is the process of verifying the identity of a user or system, which is a critical step before granting access to a network or system (see the ISC2 Study Guide, Chapter 1, Module 1). Common authentication methods include passwords, tokens, and biometrics. For example, when you log into your online banking account, you are authenticated by entering your username and password. You may also be asked to enter a one-time password (OTP) that is sent to your mobile device--an example of token-based authentication. The remaining options, while related to the authentication process, are not the primary methods. The memory cards and smart cards mentioned are types of tokens that can be used in the authentication process, but are not authentication methods themselves. Voice fingerprinting is a type of biometric authentication, but it's not as widely used as passwords or tokens because of its complexity and the need for specialized equipment. Retina scans are also a type of biometric authentication, but they're not as widely used due to the high cost and need for specialized equipment.
Topics
Community Discussion
No community discussion yet for this question.