In a move to 2FA, Crucial Technologies has begun to require employees to login using their username and password and an additional password that is generated by an authenticator and only valid for a limited period. This is what type of authentication technology?
|Architecture and Design|
|Operations and Incident Response|
|Governance, Risk, and Compliance|
|Attacks, Threats, and Vulnerabilities|