Which of the following can be used to implement two-factor authentications? Each correct answer represents a complete solution

Which of the following can be used to implement two-factor authentications? Each correct answer represents a complete solution. Choose all that apply.

Which of the following can be used to implement two-factor authentications? Each correct answer represents a complete solution. Choose all that apply.

A.
Firewall security rule

B.
Password

C.
Smart card

D.
Encrypted network configuration



Leave a Reply 0

Your email address will not be published. Required fields are marked *