Watch this video on YouTube
Which of the following is the MOST effective authentication mechanism for highly sensitive data?