An IT administrator at a financial services firm is enhancing the security policy related to user authentication on their network. The goal is to ensure only authorized users can access sensitive financial data. The administrator decides to implement an additional layer of security that involves something the user knows and something the user has. Which of the following authentication methods is the administrator planning to implement?
Hardware token only
Biometric authentication
Single-factor authentication
Multifactor authentication (MFA)