What two-factor authentication method should you use?


The network security team at your organization is enhancing your login process through the use of two-factor authentication. Which of these methods would NOT be an example of two-factor authentication?

A) Fingerprint scanner

B) Smart card

C) Pseudo-random token generator

D) Extended-length passwords that include special characters