nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #521

CERTIFIED-IN-CYBERSECURITY Question #521: Real Exam Question with Answer & Explanation

The correct answer is C: Passwords, Tokens, and Biometrics. Authentication is the process of verifying the identity of a user or system, which is a critical step before granting access to a network or system (see the ISC2 Study Guide, Chapter 1, Module 1). Common authentication methods include passwords, tokens, and biometrics. For exampl

Access Controls Concepts

Question

What are three common methods of authentication?

Options

  • APasswords, Tokens, and voice fingerprinting
  • BPasswords, Memory Cards, and Smart Cards
  • CPasswords, Tokens, and Biometrics
  • DPasswords, Smart Cards, and retina scans

Explanation

Authentication is the process of verifying the identity of a user or system, which is a critical step before granting access to a network or system (see the ISC2 Study Guide, Chapter 1, Module 1). Common authentication methods include passwords, tokens, and biometrics. For example, when you log into your online banking account, you are authenticated by entering your username and password. You may also be asked to enter a one-time password (OTP) that is sent to your mobile device--an example of token-based authentication. The remaining options, while related to the authentication process, are not the primary methods. The memory cards and smart cards mentioned are types of tokens that can be used in the authentication process, but are not authentication methods themselves. Voice fingerprinting is a type of biometric authentication, but it's not as widely used as passwords or tokens because of its complexity and the need for specialized equipment. Retina scans are also a type of biometric authentication, but they're not as widely used due to the high cost and need for specialized equipment.

Topics

#Authentication#Security Fundamentals#Access Control#Authentication Factors

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions