A company has migrated to two-factor authentication for accessing the corporate network, VPN, and SSO. Several legacy applications cannot support multifactor authentication and must continue to use usernames and passwords. Which of the following should be implemented to ensure the legacy applications are as secure as possible while ensuring functionality? (Choose two.)
Kudojikuto
Highly Voted 5 years, 1 month agohakanb
Highly Voted 4 years, 2 months agojemusu
Most Recent 4 years, 1 month agofonka
4 years, 1 month agoJoaoIRB
4 years, 2 months agoL1singh
4 years, 4 months agonakres64
4 years, 5 months agoBrian2244
4 years, 7 months agomaudsha
4 years, 5 months agoexiledwl
4 years, 7 months agoIyake
4 years, 8 months agoexiledwl
4 years, 7 months agoIrv_NewJersey
4 years, 9 months agoNot_My_Name
4 years, 10 months agoNot_My_Name
4 years, 10 months agowho__cares123456789___
4 years, 7 months agoGroove120
4 years, 7 months agobabati
4 years, 11 months agodeye
5 years, 2 months agoEPSBAL
5 years, 1 month agoCrimson
5 years, 1 month agoTeza
4 years, 11 months agoDookyBoots
4 years, 8 months agowho__cares123456789___
4 years, 7 months ago