Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? .A. Use multi-factor authenticationB. Require strong passwordsC. Enable file encryptionD. Educate end usersE. Restrict user permissions
Multi-factor authentication is an authentication method in which a computer user is allowed to access only after successfully presenting two or more pieces of evidence to an authentication mechanism.