Question: An organization has implemented a two - step verification process to protect user access to data that is stored in the cloud. Each employee now
An organization has implemented a twostep verification process to protect user access to data that is stored in the cloud.
Each employee now uses an email address or mobile number to receive a code to access the data.
Which of the following authentication methods did the organization implement?
A Token key
B Static code
C Push notification
D HOTP
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
