CompTIA Exam Questions

Which of the following describes this methodology?

An employee of a highly secure company needs to use facial recognition in addition to username/password to
successfully establish a VPN. Which of the following describes this methodology?

A.
PKI

B.
Federated identity

C.
Two-factor authentication

D.
Biometric authentication

E.
AAA