Multiple Choice
What is it called when a 2-step identity verification procedure is used to grant users access to the system?
A) smart card authorization
B) multilayer security
C) security in depth
D) two-factor authentication
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q22: The data architect designs, builds, and deploys
Q23: Which of the following DBMS evaluation categories
Q24: When selecting a DBMS and evaluating the
Q25: Which process converts a table that is
Q26: An _ is an internal company network
Q28: A(n) _ site is a backup site
Q29: Which DBA role organizes metadata, and acts
Q30: Which of the following DBMS evaluation categories
Q32: DBAs should have an understanding of information
Q49: What is the DBA's role with regard