Access control to a sensitive intranet application by mobile users can BEST be implemented
through:
A.
data encryption.
B.
digital signatures.
C.
strong passwords.
D.
two-factor authentication.
Explanation:
Two-factor authentication through the use of strong passwords combined with security tokens
provides the highest level of security. Data encryption, digital signatures and strong passwords do
not provide the same level of protection.