A security architect is implementing a new authentication system that will require users to provide something they know followed by a one-time code sent to their registered mobile device. Which authentication model is being implemented?
The correct answer is Multi-factor Authentication (MFA). This authentication model combines two or more authentication factors from different categories: something you know (such as a password), something you have (such as a mobile device receiving a one-time code), and something you are (biometrics). In this scenario, the users need to provide something they know (likely a password or PIN) and then use something they have (their mobile device) to receive and enter a one-time code, making it a multi-factor authentication implementation. Two-factor authentication (2FA) is actually a subset of MFA specifically using two factors, which is what's described in the question, but MFA is the more comprehensive term that encompasses this implementation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different types of authentication factors used in MFA?
Open an interactive chat with Bash
How does Multi-factor Authentication improve security?
Open an interactive chat with Bash
What is the difference between MFA and Two-Factor Authentication (2FA)?
Open an interactive chat with Bash
ISC2 CISSP
Identity and Access Management (IAM)
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access