An information security professional is reviewing user access controls on a customer-facing application. The application must have multi-factor authentication (MFA) in place. The application currently requires a username and password to login. Which of the following options would BEST implement MFA?
Alita
5 months agoTalia
5 months agoAmber
5 months agoSteffanie
5 months agoReita
5 months agoMabel
6 months agoChristiane
6 months agoJamey
6 months agoMarkus
6 months agoVicky
6 months agoMira
6 months agoDevora
6 months agoCarma
6 months ago