Which of the following can be used to implement two-fac… seenagape 8 years ago Which of the following can be used to implement two-factor authentications? Each correct answerrepresents a complete solution. Choose all that apply. A. Firewall security rule B. Password C. Smart card D. Encrypted network configuration ← Previous question Next question →