A company recently experienced a network security breach and wants to apply two-factor authentication to secure its network.
Which of the following should the company use? (Select TWO)
A . User ID and password
B . Cognitive password and OTP
C . Fingerprint scanner and voice recognition
D . Smart card and PIN
E . Proximity card and CAC
Answer: BE