InterviewSolution
| 1. |
How You Will Authenticate A Person Or A User? |
|
Answer» The first and in fact, the most common approach is passwords that they have. These are basically the secret piece of INFORMATION that no one else except the AUTHORIZATION USERS have. Next approach is biometrics which is becoming more and more common in the present SCENARIO. In addition to this, access cards can be offered to the users for allowing them to enter the restricted areas such as server rooms. The first and in fact, the most common approach is passwords that they have. These are basically the secret piece of information that no one else except the authorization users have. Next approach is biometrics which is becoming more and more common in the present scenario. In addition to this, access cards can be offered to the users for allowing them to enter the restricted areas such as server rooms. |
|