Many applications use _________________ where two independent factors are used to identify a user.
(a) Two-factor authentication
(b) Cross-site request forgery
(c) Cross-site scripting
(d) Cross-site scoring scripting
This question was posed to me during an interview for a job.
My question is taken from Application Security in section Database Programming Techniques of Database Management