Which of the following can be used to implement two-factor authentications? Each correct answer
represents a complete solution. Choose all that apply.
A.
Firewall security rule
B.
Password
C.
Smart card
D.
Encrypted network configuration
Explanation:
Two-factor authentication is defined as a security process that is used to confirm user identities by
using two individual factors as follows:
Something they have such as token, smart cards, etc
Something they know such as password.