12 Questions
What is an example of a possession factor in authentication?
Smart card
What is the principal factor categorized as 'inherence' in authentication?
Fingerprint
What makes an authentication technology strong?
Being multifactor
What is the purpose of 2-step verification?
To use a soft token to check the authenticity of a sign-in request
What is another term for a soft token?
One-time password (OTP)
Which authentication method is typically installed to a trusted device under the sole control of the user?
Authenticator application
What is typically used to establish a trust relationship between the service and an authenticator app?
Encryption keys
What type of devices are typically compliant with Fast Identity Online (FIDO) version 2 standards?
Hard tokens
In multifactor authentication, requiring a PIN along with what is NOT considered multifactor?
First school attended
Which method might be used to deliver a soft token code to the user?
Both A and B
What must the user do to authorize the sign-in request when using an authenticator app?
Unlock the device
What must the user do to transmit credentials to the service when using a hard token?
Connect the token and authorize it
Test your knowledge of authentication methods with this quiz. Explore different ways users authenticate their identity to access resources and change system configurations in an access control system.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free