Common implementations of strong authentication may use which of the following factors in their authentication efforts (Choose three.):
A. 'something you know'
B. 'something you have'
C. 'something you are'
D. 'something you have done in the past on this same system'
E. 'something you have installed on this same system'
F. None of the choices.
A. 'something you know'
B. 'something you have'
C. 'something you are'
D. 'something you have done in the past on this same system'
E. 'something you have installed on this same system'
F. None of the choices.