Many applications use _________________ where two independent factors are used to identify a user.
(a) Two-factor authentication
(b) Cross-site request forgery
(c) Cross-site scripting
(d) Cross-site scoring scripting
This question was posed to me during an interview for a job.
My question is taken from Application Security in section Database Programming Techniques of Database Management
Select the correct answer from above options
Interview Questions and Answers, Database Interview Questions and Answers for Freshers and Experience