answersLogoWhite

0


Best Answer

Including a username, password, personal identification number (PIN), smart card, or biometric data.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are some of the techniques through which authentication is accomplished?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Can you be both a MD and a Ph.D?

It is a possibility, and there are some individuals who have accomplished this. However, not many.It is a possibility, and there are some individuals who have accomplished this. However, not many.It is a possibility, and there are some individuals who have accomplished this. However, not many.It is a possibility, and there are some individuals who have accomplished this. However, not many.It is a possibility, and there are some individuals who have accomplished this. However, not many.It is a possibility, and there are some individuals who have accomplished this. However, not many.


What type of authentication uses cards to gain access to buildings?

Identity based authentication or Role based authentication using magnetic card stripes can be used, or some other difficult to forge encoding, to gain access to buildings.


What are the Techniques of dance?

Describe some mime techniques


Would you Illustrate of making crossover and straight-through cabling?

There are some great YouTube videos demonstrating the techniques... check them out.


Can you install active directory in Linux server?

Most Linux distributions come with several PAM authentication modules, including modules that support authentication to an LDAP directory and authentication using Kerberos. You can use these modules to authenticate to Active Directory, but there are some significant limitations.


What are the mime techniques of dance?

Describe some mime techniques


What are some ways to implement controlled access?

Implementing access control is a very important aspect for any system. It will insure that only authorized users can access the system. To do it you must go through authorization and authentication.


What words most closely means a situation in which nothing can be accomplished?

Some words that mean a situation in which nothing can be accomplished are:StalemateImpasseGridlock


What are some thingsThurgood Marshall accomplished?

none of your business


What are some accomplishments Chief Joseph has accomplished?

blah


What are some spy techniques?

Surveillance and Counter surveillance are important spy techniques.


What are some knowledge sharing techniques?

Some knowledge sharing techniques are placing the information into an essay or notecards that can be shared with other users. Other techniques include studying together.