A company is implementing enhanced user authentication for system administrators accessing the company’s confidential servers. Which of the following would be the BEST example of two-factor authentication?
A. ID badge and keys
B. Password and key fob
C. fingerprint scanner and retina scan
D. Username and password