Users in a corporation currently authenticate with a username and password. A security administrator wishes to implement two-factor authentication to improve security.Which of the following authentication methods should be deployed to achieve this goal?

A. PIN
B. Security question
C. Smart card
D. Passphrase
E. CAPTCHA

Answer: C. Smart card

Computer Science & Information Technology

You might also like to view...

A Lookup field can be a(n) ________

A) Excel worksheet B) tag C) table D) macro

Computer Science & Information Technology

Which value for the display property is useful when configuring horizontal navigation within an unordered list?

a. none b. block c. inline d. fixed

Computer Science & Information Technology