Which methods can be used to implement multifactor authentication?
- VPNs and VLANs
- IDS and IPS
- passwords and fingerprints
- tokens and hashes
Explanation:
A cybersecurity specialist must be aware of the technologies available that support the CIA triad. |