A security administrator needs to set up multifactor authentication for a cloud application. Which of the following should the administrator use to establish an authentication process? (Choose two.)
A. Logs
B. Password
C. Receipt
D. Encryption
E. Database
F. Software token