3.7. Deploy various authentication models and identify the components of each.
The deployment of various authentication models typically involves the implementation of a specific operating system, guidance from a security policy, and numerous specialized technology products, systems, and solutions. The following sections discuss many of these that are relevant for the Security+ exam.
3.7.1. Biometric reader
Biometrics is the term used to describe the collection of physical attributes of the human body that can be used as authentication factors. Biometrics fall into the authentication factor category of "something you are": You, as a human, have the element of identification as part of your physical body. Biometrics include fingerprints, palm ...
Get CompTIA Security+™: Review Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.