An information security professional is reviewing user access controls on a customer-facing application. The application must have multi-factor authentication (MFA) in place. The application currently requires a username and password to login. Which of the following options would BEST implement MFA?
Alita
3 months agoTalia
3 months agoAmber
3 months agoSteffanie
4 months agoReita
4 months agoMabel
4 months agoChristiane
4 months agoJamey
4 months agoMarkus
5 months agoVicky
5 months agoMira
5 months agoDevora
5 months agoCarma
5 months ago