terça-feira, 11 de junho de 2019

20

To log in to her network, Jill uses a token and a four-digit PIN.


Which authentication measure best describes this?


Two-factor authentication

Because Jill uses something she had(a token) and something she knows(the PIN),

this is considered two-factor authentication.

Two factors are used for authentication here.

Sem comentários:

Enviar um comentário