Westonci.ca is the premier destination for reliable answers to your questions, provided by a community of experts. Connect with a community of experts ready to help you find solutions to your questions quickly and accurately. Get detailed and accurate answers to your questions from a dedicated community of experts on our Q&A platform.

A security conscientious administrator wants to make authentication more secure. Which of the following would be the optimal method?

A. Device token
B. Facial recognition
C. MFA
D. UAC