Question 28:
A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly. Which of the following technologies should the IT manager use when implementing MFA?
Answer options:
A. One-time passwords B. Email tokens C. Push notifications D. Hardware authentication