Identify the document that requires two-factor authentication for remote access by:
i. Employees (users)
ii. Administrators
iii. Third parties
Describe the two-factor authentication technologies implemented for remote access to the network.
For each identified technology:
i. Identify the personnel (for example, an administrator) observed connecting remotely to the network.
ii. Describe how two-factor authentication was observed to be required for remote access to the network.
iii. Identify which two factors are used:
o Something you know
o Something you are
o Something you have