CompTIA A+ Core 2 (220-1102) Practice Exam 2025 - Free Practice Questions and Study Guide

Question: 1 / 400

Which technology is commonly used to enhance security in online transactions?

IP Address Tracking

Two-step verification

Two-step verification is commonly used to enhance security in online transactions by adding an additional layer of protection beyond just a username and password. With two-step verification, after entering the correct username and password, the user must also provide a second piece of information to verify their identity. This can be a code sent to a mobile device, a biometric factor, or an authentication app.

This method is particularly effective because, even if an attacker manages to obtain a user’s password, they would not be able to complete the login process without the second verification step. This significantly reduces the risk of unauthorized access to sensitive information and accounts.

In contrast, while IP address tracking can help in identifying suspicious activities and can aid in combating fraud, it does not provide real-time security for transactions. VPN encryption is useful for protecting data over public networks, but it does not specifically enhance transaction security as effectively as two-step verification. Firewall settings are vital for creating barriers against unauthorized access, but they do not contribute directly to the authentication process needed for secure online transactions.

Get further explanation with Examzify DeepDiveBeta

VPN Encryption

Firewall Settings

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy