15.01.2024 Views

CompTIA A+ Certification All-in-One Exam Guide

  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 27-6 BIOS/UEFI access password request

Hardware Authentication Gates, doors, and computers can make use of

badge readers, smart card readers, and biometric scanners to authenticate

users with more authority than mere passwords. Smart cards are credit card–

sized cards with circuitry that can identify the bearer of the card. Smart cards

are relatively common for tasks such as authenticating users for mass transit

systems but are fairly uncommon in computers. Figure 27-7 shows a smart

card and keyboard combination.

Figure 27-7 Keyboard-mounted smart card reader being used for a

commercial application (photo courtesy of Cherry Corp.)

Security tokens are devices that store some unique information that the

user carries on their person. They may be digital certificates, passwords, or

biometric data. They may also store an RSA token. RSA tokens are randomnumber

generators that are used with user names and passwords to ensure

extra security. Most security hardware tokens come in the form of key fobs,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!