A company is implementing enhanced user authentication for system administrators accessing the company’s confidential servers. Which of the following would be the BEST example of two-factor authentication?
A.
ID badge and keys
B.
Password and key fob
C.
fingerprint scanner and retina scan
D.
Username and password