Microsoft Exam Questions

Which of the following can be used to implement two-factor authentications? Each correct answer repr

Which of the following can be used to implement two-factor authentications? Each correct answer represents a complete solution. Choose all that apply.

A.
Firewall security rule

B.
Password

C.
Smart card

D.
Encrypted network configuration