An information security professional is reviewing user access controls on a customer-facing application. The application must have multi-factor authentication (MFA) in place. The application currently requires a username and password to login. Which of the following options would BEST implement MFA?
Providencia
4 months agoMaynard
2 months agoDulce
2 months agoEzekiel
3 months agoXochitl
3 months agoCarman
4 months agoSheron
3 months agoChery
3 months agoMarva
4 months agoElly
3 months agoVincent
3 months agoLashawnda
3 months agoLauna
4 months agoElliot
4 months agoClemencia
4 months agoKallie
3 months agoJunita
3 months agoMari
4 months agoLashanda
4 months agoGertude
5 months agoAnnamaria
5 months agoOllie
5 months agoDevorah
4 months agoGarry
5 months ago