Which item is a physical device used for secure user authentication?

Prepare for the Certified Identity and Access Manager Exam using flashcards and multiple-choice questions. Gain insights into the exam format, practice with real-world scenarios, and ensure your success in becoming a certified professional.

Multiple Choice

Which item is a physical device used for secure user authentication?

Explanation:
Authentication relies on the idea of something you have as a key factor. A physical device used for secure user authentication is a personal USB key because it’s a tangible hardware token that proves you possess the device. When you plug it in (or use it via newer interfaces), it performs cryptographic operations to authenticate you to the service, often following standards like FIDO2/WebAuthn for phishing-resistant access. The other options aren’t physical hardware tokens: a virtual token is software-based rather than a physical device, face recognition is a biometric factor (something you are), and text message authentication is a code delivered remotely rather than a device you carry.

Authentication relies on the idea of something you have as a key factor. A physical device used for secure user authentication is a personal USB key because it’s a tangible hardware token that proves you possess the device. When you plug it in (or use it via newer interfaces), it performs cryptographic operations to authenticate you to the service, often following standards like FIDO2/WebAuthn for phishing-resistant access.

The other options aren’t physical hardware tokens: a virtual token is software-based rather than a physical device, face recognition is a biometric factor (something you are), and text message authentication is a code delivered remotely rather than a device you carry.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy