While setting up secure access to a company's internal financial records, the security administrator decides to use a method that requires employees to present two forms of verification before they are granted access. Which of the following best describes this method?
Continuous authentication
Personality verification
Multifactor authentication
Single-factor authentication