Access control to a sensitive intranet application by mobile users can BEST be implemented through:
A. data encryption.
B. digital signatures.
C. strong passwords.
D. two-factor authentication.
A. data encryption.
B. digital signatures.
C. strong passwords.
D. two-factor authentication.