A systems administrator is required to enforce MFA for corporate email account access, relying on the
possession factor. Which of the following authentication methods should the systems administrator choose?
(Choose two.)
A. Passphrase
B. Time-based one-time password
C. Facial recognition
D. Retina scan
E. Hardware token
F. Fingerprints
possession factor. Which of the following authentication methods should the systems administrator choose?
(Choose two.)
A. Passphrase
B. Time-based one-time password
C. Facial recognition
D. Retina scan
E. Hardware token
F. Fingerprints