Ann a network administrator has been tasked with strengthening the authentication of users logging into
systems in area containing sensitive information. Users log in with usernames and passwords, following by a
retinal scan. Which of the following could she implement to add an additional factor of authorization?
A.
Requiring PII usage
B.
Fingerprint scanner
C.
Magnetic swipe cards
D.
Complex passphrases