While setting up secure access to a company's internal financial records, the security administrator decides to use a method that requires employees to present two forms of verification before they are granted access. Which of the following best describes this method?
Single-factor authentication
Continuous authentication
Multifactor authentication
Personality verification