An employee of a highly secure company needs to use facial recognition in addition to username/password to successfully establish a VPN.
Which of the following describes this methodology?
A.
PKI
B.
Federated identity
C.
Two-factor authentication
D.
Biometric authentication
E.
AAA