21. What is two-factor authentication? Select all that apply.
- a method that requires two usernames
- a method where you need two passwords
- a method where users are required to verify their credentials through a combination of hardware and/or software. Usually a username, password, and a short-lived token.
- a method where you authenticate twice
23. A proxy is something that _______________________.
- communicates on behalf of something else
- allows for many devices to speak to one other device
- encrypts traffic sent across the Internet
- sends data across a single network segment
24. What are some use cases for reverse proxies? Select all that apply.
- IP address translation
- Improved computer graphics
- Encryption and Decryption
- Load balancing
25. What was one of the first technologies that commonly utilized 2FA (Two-Factor Authentication)?
- TCP
- DNS
- VPN
- UDP