A Chief Information Security Officer (CISO) wants to implement two-factor authentication
within the company. Which of the following would fulfill the CISO’s requirements?
A.
Username and password
B.
Retina scan and fingerprint scan
C.
USB token and PIN
D.
Proximity badge and token