Answer: (P1)preventing the loss of availability, the loss of integrity, and the loss of confidentiality for systems and data.
(P2) Two-factor authentication is an authentication method in which a device user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication process...