The network security team at your organization is enhancing your login process through the use of two-factor authentication. Which of these methods would NOT be an example of two-factor authentication?
A) Fingerprint scanner
B) Smart card
C) Pseudo-random token generator
D) Extended-length passwords that include special characters
Pages: 1 2