Which of the following authentication methods did the organization implement?

Posted by: Pdfprep Category: SY0-501 Tags: , ,

An organization has implemented a two-step verification process to protect user access to data that is stored in the cloud. Each employee now uses an email address or mobile number to receive a code to access the data.

Which of the following authentication methods did the organization implement?
A . Token key
B . Static code
C . Push notification
D . HOTP

Answer: D

Leave a Reply

Your email address will not be published.