You are discussing computer security with a group of high sc
You are discussing computer security with a group of high school students attending a technology workshop, and you are mentioning different authentication methods used in very secure environments. Of the following, which authentication technology can store data about other authentication methods?
A. Username
B. Passwords
C. Biometrics
D. Smart cards
Solution
D. Smart cards can be used to authenticate to computers or other devices and can contain information such as username, password, and even biometric data such as fingerprints, to be used when multiple authentication methods are required in very secure settings.

