An administrator wants to configure two-factor authentication on all enterprise-owned mobile devices. Which of the following should the administrator configure?
A. Username and password
B. Face recognition and PIN
C. Face recognition and thumbprint
D. Pattern lock and PIN