C (Push-based):Push notifications to a registered device (typically a phone) are used as a second authentication factor.
D (Possession-based):Possession factor includes physical tokens, smart cards, or registered devices — verifying that the user possesses something unique.
Other options explained:
A/B/E: Not valid MFA factors under standard authentication frameworks.
==========
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit