Multiple Choice
The use of the smart card or security tokens is referred to as a two factor authorization because:
A) It is based on something the user has, the token or card, and something the user knows, the password.
B) It requires that the user is granted the card / token in a secure environment and that the user actually uses the card / token.
C) It requires that the user has two different authorizations: 1) to receive the card / token, and 2) to use the card / token.
D) It requires the use the card / token to 1) login to the system and 2) access the applications.
Correct Answer:

Verified
Correct Answer:
Verified
Q4: General controls for an IT system include:<br>A)Controls
Q54: This should be established for every authorized
Q78: Telecommuting workers cause two sources of risk
Q79: Companies who provide mobile devices for employees,
Q80: To increase the effectiveness of login restrictions,
Q84: Controls will help to reduce risks, but
Q85: To increase the effectiveness of login restrictions,
Q86: The user ID and password for a
Q87: It is important to understand that the
Q89: A company using public cloud computing has