For IndividualsFor Educators
ExpertMinds LogoExpertMinds
ExpertMinds

Ace your certifications with Practice Exams and AI assistance.

  • Browse Exams
  • For Educators
  • Blog
  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Support
  • AWS SAA Exam Prep
  • PMI PMP Exam Prep
  • CPA Exam Prep
  • GCP PCA Exam Prep

© 2026 TinyHive Labs. Company number 16262776.

    PracticeAQA GCSEAQA GCSE Computer Science Paper 2Question 15.2
    Easy2 marksStructured
    Cyber securityGeneralcyber security2FAbiometrics

    AQA GCSE · Question 15.2 · Cyber security

    Describe one security measure that could be used, in addition to a password, to make sure that a user is who they are claiming to be.

    How to approach this question

    1. Think of methods of authentication that aren't just "something you know" (like a password). Consider "something you have" or "something you are". 2. Choose one method, for example, biometrics or two-factor authentication (2FA). 3. Describe how it works. For biometrics, explain that it uses a unique physical trait. For 2FA, explain that it requires a second code from a separate device.

    Full Answer

    **Biometric authentication:** This uses a unique physical characteristic of the user, such as a fingerprint scan, facial recognition, or iris scan. The system compares the live biometric data with a stored template to verify the user's identity. This is difficult to fake or steal compared to a password.
    A common and effective security measure to supplement passwords is **Two-Factor Authentication (2FA)** or **Multi-Factor Authentication (MFA)**. **Description:** 2FA adds a second layer of security to the login process. After a user enters their correct password (the first factor - "something you know"), they are required to provide a second piece of evidence to prove their identity. This second factor is typically: - **Something you have:** A one-time code generated by an authenticator app on their smartphone, or sent to them via SMS. - **Something you are:** A biometric input like a fingerprint or face scan. By requiring this second factor, even if an attacker steals the user's password, they still cannot access the account without also having physical access to the user's phone or their biometric data.

    Common mistakes

    ✗ Just naming a method (e.g., "biometrics") without describing it. ✗ Describing a way to make passwords stronger (e.g., "use more characters") as this is not an *additional* measure. ✗ Naming a brand like "Google Authenticator" without explaining the underlying concept (2FA).
    Question 15.1All questionsQuestion 15.3

    Practice the full AQA GCSE Computer Science Paper 2

    46 questions · hints · full answers · grading

    Sign up freeTake the exam

    More questions from this exam

    Q01.1Convert the binary number 11010100 into decimal.EasyQ01.2Convert the binary number 10111001 into hexadecimal. You should show your working.MediumQ01.3State the largest decimal number that can be represented using 6 bits.EasyQ02.1Add together the following three binary numbers and give your answer in binary. 00110110 1001...MediumQ02.2Apply a binary shift three places to the right on the bit pattern 10101000. Give the result using...Easy
    View all 46 questions →