A two factor authentication method is considered a:

A.
Technical control
B.
Patching control
C.
Corrective control
D.
Systematic control
Explanation:
By technical controls we mean some or all of the following: Access Control software Antivirus
Software Passwords Smart Cards Encryption Call-back systems Two factor authentication Note:
logical & technical controls are used interchangeably (pg 158 of CISSP / Shon Harris / 5th edition)