Which of the following can be used to implement two-factor authentications? Each correct answer represents a complete solution. Choose all that apply.
A.
Firewall security rule
B.
Password
C.
Smart card
D.
Encrypted network configuration
Which of the following can be used to implement two-factor authentications? Each correct answer represents a complete solution. Choose all that apply.
Which of the following can be used to implement two-factor authentications? Each correct answer represents a complete solution. Choose all that apply.
A.
Firewall security rule
B.
Password
C.
Smart card
D.
Encrypted network configuration