A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be
non-disruptive and user friendly. Which of the following technologies should the IT manager use when
implementing MFA?
A. One-time passwords
B. Email tokens
C. Push notifications
D. Hardware authentication
non-disruptive and user friendly. Which of the following technologies should the IT manager use when
implementing MFA?
A. One-time passwords
B. Email tokens
C. Push notifications
D. Hardware authentication