PdfPrep.com

Which of the following should the company use?

A company recently experienced a network security breach and wants to apply two-factor authentication to secure its network.

Which of the following should the company use? (Select TWO)
A . User ID and password
B . Cognitive password and OTP
C . Fingerprint scanner and voice recognition
D . Smart card and PIN
E . Proximity card and CAC

Answer: BE

Exit mobile version