Users in a corporation currently authenticate with a username and password. A security administrator wishes to implement two-factor authentication to improve security.Which of the following authentication methods should be deployed to achieve this goal?
A. PIN
B. Security question
C. Smart card
D. Passphrase
E. CAPTCHA
Answer: C. Smart card
Computer Science & Information Technology
You might also like to view...
A Lookup field can be a(n) ________
A) Excel worksheet B) tag C) table D) macro
Computer Science & Information Technology
Which value for the display property is useful when configuring horizontal navigation within an unordered list?
a. none b. block c. inline d. fixed
Computer Science & Information Technology