A security administrator needs to set up multifactor authentication for a cloud application. Which of the following
should the administrator use to establish an authentication process? (Choose two.)
A. Logs
B. Password
C. Receipt
D. Encryption
E. Database
F. Software token
should the administrator use to establish an authentication process? (Choose two.)
A. Logs
B. Password
C. Receipt
D. Encryption
E. Database
F. Software token