______________________ increases security by verifying identity based on more than just a password or PIN.

A. RAT
B. A hash value
C. Two-factor authentication
D. HTTPS

Answer: C

Computer Science & Information Technology

You might also like to view...

The World Wide Web was based on a protocol developed by ________

A) the U.S. government B) Apple C) Tim Berners-Lee D) Microsoft

Computer Science & Information Technology

To determine each object's exact location, we can use the world's ____.

A. properties B. methods C. functions D. axes

Computer Science & Information Technology