Question

41.4% complete
Question
The cybersecurity expert at a technology firm recommends adding another layer of protection to employee accounts. The expert suggests a physical device that users can insert into compatible systems to verify their identity alongside a password. Which authentication method is the cybersecurity expert recommending for the employees?

Answers

GPT-4o mini
The authentication method being recommended by the cybersecurity expert is **two-factor authentication (2FA)** using a **hardware token** or **security key**. This physical device typically requires users to insert it into a compatible system (like a USB port) to verify their identity in addition to entering their password. This approach enhances security by requiring something the user has (the hardware device) along with something the user knows (the password).

Related Questions