A company recently experienced a network security breach and wants to apply two-factor authentication to secure its network.
Which of the following should the company use? (Select TWO)
A . User ID and password
B . Cognitive password and OTP
C . Fingerprint scanner and voice recognition
D . Smart card and PIN
E . Proximity card and CAC
Answer: BE
Latest SY0-501 Dumps Valid Version with 1130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund