A two factor authentication method is considered a:
A.
Technical control
B.
Patching control
C.
Corrective control
D.
Systematic control
Explanation:
By technical controls we mean some or all of the following:
Access Control software
Antivirus Software
Passwords
Smart Cards
Encryption
Call-back systems
Two factor authentication
Note: logical & technical controls are used interchangeably (pg 158 of CISSP / Shon Harris / 5th
edition)