A company has implemented a bring your own device (BYOD) policy and requires all employee mobile devices to be secured with two-factor authentication (2FA) before accessing corporate email and applications. Which of the following is the BEST method to satisfy this requirement?
Require the use of SMS text message verification codes sent to the employee’s device.
Implement a policy that solely relies on security questions for employee verification.
Utilize an authenticator app that generates time-based one-time passwords.
Depend on a PIN code that is sent to the employee's alternate email address.
Enforce a rule that employees must memorize a set of complex passwords.
Mandate that devices are protected by a fingerprint scanner only.