0
0
Intro to Computingfundamentals~20 mins

Two-factor authentication in Intro to Computing - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Two-Factor Authentication Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
1:30remaining
What is the main purpose of two-factor authentication?

Imagine you have a safe that requires two different keys to open. What is the main reason for using two keys instead of just one?

ATo increase security by requiring two different proofs of identity
BTo allow more people to open the safe at the same time
CTo make it easier to open the safe quickly
DTo reduce the cost of making keys
Attempts:
2 left
💡 Hint

Think about how having two locks instead of one affects safety.

trace
intermediate
1:30remaining
Trace the steps in a two-factor authentication process

Follow the steps below and identify what happens after the user enters their password correctly.

  1. User enters username and password.
  2. System checks password.
  3. ?
  4. User enters code from their phone.
  5. System verifies code and grants access.
ASystem resets the user's password.
BSystem asks for a security question answer.
CSystem logs the user out immediately.
DSystem sends a code to the user's phone.
Attempts:
2 left
💡 Hint

Think about what the second factor usually is in two-factor authentication.

Comparison
advanced
2:00remaining
Compare single-factor and two-factor authentication

Which of the following best explains the difference between single-factor and two-factor authentication?

ASingle-factor requires only one proof of identity; two-factor requires two different proofs.
BSingle-factor uses two passwords; two-factor uses one password and one code.
CSingle-factor is more secure than two-factor authentication.
DTwo-factor authentication does not require a password.
Attempts:
2 left
💡 Hint

Think about how many types of identity proof each method requires.

identification
advanced
1:30remaining
Identify the second factor in two-factor authentication

Which of the following is commonly used as the second factor in two-factor authentication?

AEmail address
BPassword
CFingerprint or code sent to phone
DUsername
Attempts:
2 left
💡 Hint

The second factor is usually something you have or something you are.

🚀 Application
expert
2:00remaining
What happens if the second factor code is entered incorrectly multiple times?

Consider a system that locks the user out after three wrong two-factor codes. What is the main reason for this behavior?

ATo allow the user to try unlimited times without risk
BTo prevent unauthorized access by blocking repeated guessing
CTo reset the user's password automatically
DTo send the correct code to the user again
Attempts:
2 left
💡 Hint

Think about how repeated wrong attempts can be a security risk.