What are the two mo...
 
Notifications
Clear all

What are the two most commonly used authentication factors in multifactor authentication? (Choose two)

1 Posts
1 Users
0 Likes
161 Views
(@tsuchiuramanual)
Posts: 747
Noble Member
Topic starter
 

What are the two most commonly used authentication factors in multifactor authentication? (Choose two)

A. biometric factor

B. time factor

C. confidentiality factor

D. knowledge factor

E. encryption factor

Show Answer Hide Answer

Suggested Answer: A, D

Explanation:

Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two or more

verification factors to gain access to a resource. MFA requires means of verification that unauthorized users won’t have.

Proper multi-factor authentication uses factors from at least two different categories.

MFA methods:

+ Knowledge C usually a password C is the most commonly used tool in MFA solutions. However, despite their simplicity, passwords have become a security problem and slow down productivity.

+ Physical factors C also called possession factorsCuse tokens, such as a USB dongle or a portable device,

that generate a temporary QR (quick response) code. Mobile phones are commonly used, as they have the advantage of being readily available in most situations.

+ Inherent C This category includes biometrics like fingerprint, face, and retina scans. As technology advances,

it may also include voice ID or other behavioral inputs like keystroke metrics. Because inherent factors are

reliably unique, always present, and secure, this category shows promise.

+ Location-based and time-based C Authentication systems can use GPS coordinates, network parameters,

and metadata for the network in use, and device recognition for MFA. Adaptive authentication combines these data points with historical or contextual user data.

A time factor in conjunction with a location factor could detect an attacker attempting to authenticate in Europe

when the user was last authenticated in California an hour prior, for example.

+ Time-based one-time password (TOTP) C This is generally used in 2FA but could apply to any MFA

method where a second step is introduced dynamically at login upon completing a first step. The wait for a second stepCin which temporary passcodes are sent by SMS or emailCis usually brief, and the process is easy to use for a wide range of users and devices. This method is currently widely used.

+ Social media C In this case a user grants permission for a website to use their social media username and password for login. This provide an easy login process, and one generally available to all users.

+ Risk-based authentication C Sometimes called adaptive multi-factor authentication, this method combines adaptive authentication and algorithms that calculate risk and observe the context of specific login requests.

The goal of this method is to reduce redundant logins and provide a more user-friendly workflow.

+ Push-based 2FA C Push-based 2FA improves on SMS and TOTP 2FA by adding additional layers of security while improving ease of use. It confirms a user’s identity with multiple factors of authentication that other methods cannot. Because push-based 2FA sends notifications through data networks like cellular or Wi-Fi, users must have data access on their mobile devices to use the 2FA functionality.

Reference: https://www.cisco.com/c/en/us/products/security/what-is-multi-factor-authentication.html

The two most popular authentication factors are knowledge and inherent (including biometrics like fingerprint,face, and retina scans. Biometrics is used commonly in mobile devices).
 
Posted : 04/11/2022 8:16 am
Topic Tags

Latest 350-701 V2 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: