You are trying to implement a strong authentication system. Which one of thefollowing would be the appropriate system to implement?
A.
Something you know
B.
Something you are
C.
Something you have
D.
Something you have and something you know
Explanation:
The three authentication approaches are:
– Something you know
– Something you have
– Something you areStrong authentication, also called two factor authentication, requires two out ofthese three.
D
D