Answer:
The answer is "Option A"
Step-by-step explanation:
Its organizations should create authentication methods on the workstations to ensure that the workplaces are accessible only by an authenticated person. It can also be OTP login or any form of authentication. This mechanism is also used in the verification during the sign-in mechanism, such as entering a code on their mobile phone or having a fingerprint scan, and wrong choices can be described as follows:
- In option b and option d, both were wrong because It is a hardware device that is not used in this process.
- In option c, The web application is not used for authentication. so, it is wrong.