Which one of the following factors is NOT one on which Authentication is based?
Click on the arrows to vote for the correct answer
A. B. C. D.D.
Authentication is based on the following three factor types: Type 1
Something you know, such as a PIN or password Type 2
Something you have, such as an ATM card or smart card Type 3
Something you are (Unique physical characteristic), such as a fingerprint or retina scan Source: KRUTZ, Ronald L.
& VINES, Russel.
D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 36
Also: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002, chapter 4: Access Control (pages 132-133).
Authentication is the process of verifying the identity of a user or system entity to ensure that only authorized access is granted. Authentication is typically based on one or more of the following factors:
A. Type 1. Something you know, such as a PIN or password This factor is based on knowledge possessed by the user, such as a password or PIN, which can be used to authenticate the user's identity. This factor is commonly used in username/password authentication, where the user enters a username and password to access a system or application.
B. Type 2. Something you have, such as an ATM card or smart card This factor is based on something that the user possesses, such as an ATM card or smart card. The card can be used to authenticate the user's identity by requiring the user to present the card to a card reader, which verifies the authenticity of the card.
C. Type 3. Something you are (based upon one or more intrinsic physical or behavioral traits), such as a fingerprint or retina scan This factor is based on the unique characteristics of the user, such as biometric data like a fingerprint or retina scan. Biometric authentication is becoming increasingly popular due to its high level of security and convenience.
D. Type 4. Something you are, such as a system administrator or security administrator. This factor is not one on which authentication is typically based. Rather, this factor is more related to authorization, which determines what actions a user is allowed to perform within a system or application.
Therefore, the correct answer is D.