CompTIA Security+ Exam Preparation | Mobile Workstation Authentication Technologies

Which Authentication Technologies Rely on User's Physical Characteristics? (Choose Two)

Prev Question Next Question

Question

When attempting to secure a mobile workstation, which of the following authentication technologies rely on the user's physical characteristics? (Choose two.)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E. F.

BC.

The two authentication technologies that rely on the user's physical characteristics are:

  1. Retina scan: Retina scan is a biometric authentication technology that uses the unique pattern of blood vessels in a person's retina to identify them. It requires a special scanning device that captures an image of the retina, which is then analyzed to match against a pre-registered template for the user.

  2. Fingerprint scan: Fingerprint scan is another biometric authentication technology that uses the unique patterns on a person's fingertip to identify them. It requires a fingerprint scanner that captures an image of the fingerprint, which is then analyzed to match against a pre-registered template for the user.

On the other hand, the remaining options are:

A. MAC address table: MAC address table is not an authentication technology but a table that is used in networking to map MAC addresses to corresponding physical ports on a network switch.

D. Two-factor authentication: Two-factor authentication (2FA) is a security process that requires two forms of authentication to verify the user's identity. It can be any two of the following: something the user knows (like a password), something the user has (like a security token), or something the user is (like a biometric identifier).

E. CAPTCHA: CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a security mechanism that tests whether the user is a human or a computer program trying to automate the process. It typically involves displaying an image containing distorted text or an audio clip containing spoken words that the user must enter correctly.

F. Password string: Password string is a traditional authentication technology that relies on something the user knows (i.e., a password or passphrase) to authenticate the user. However, it does not rely on the user's physical characteristics.

In conclusion, the two authentication technologies that rely on the user's physical characteristics are Retina scan and Fingerprint scan.