Ann a network administrator has been tasked with strengthening the authentication of users
logging into systems in area containing sensitive information. Users log in with usernames and
passwords, following by a retinal scan. Which of the following could she implement to add an
additional factor of authorization?
A.
Requiring PII usage
B.
Fingerprint scanner
C.
Magnetic swipe cards
D.
Complex passphrases