A company would like to implement two-factor authentication for its vulnerability management
database to require system administrators to use their token and random PIN codes. Which of the
following authentication services accomplishes this objective?
A.
SAML
B.
TACACS+
C.
Kerberos
D.
RADIUS