A company’s security policy requires all employees to use a secure method for accessing corporate email on their mobile devices. The IT department has implemented a solution that requires not only a password but also a verification code received on another device owned by the user. During setup on an employee’s smartphone, which of the following best describes the additional security measure being implemented?
Two-factor authentication
Pin code lock
Biometric verification
Pattern unlock security