An information security professional is reviewing user access controls on a customer-facing application. The application must have multi-factor authentication (MFA) in place. The application currently requires a username and password to login. Which of the following options would BEST implement MFA?
Edmond
5 months agoDella
5 months agoJessenia
5 months agoBettina
4 months agoDaniel
4 months agoHerman
5 months agoPearly
5 months agoLauran
4 months agoFrancesco
5 months agoDoyle
5 months agoMarget
5 months agoLinsey
5 months agoVivienne
4 months agoJacklyn
5 months agoEdmond
5 months agoGiuseppe
6 months agoPatti
5 months agoPatti
5 months ago