Ann a network administrator has been tasked with strengthening the authentication of users logging into
systems in area containing sensitive information. Users log in with usernames and passwords, following
by a retinal scan. Which of the following could she implement to add an additional factor of
authorization?
A.
Requiring PII usage
B.
Fingerprint scanner
C.
Magnetic swipe cards
D.
Complex passphrases