An administrator wants to configure two-factor authentication on all enterprise-owned mobile
devices. Which of the following should the administrator configure?
A.
Username and password
B.
Face recognition and PIN
C.
Face recognition and thumbprint
D.
Pattern lock and PIN
Explanation: