A. Using two different encryption algorithms
B. Verifying identity using two independent methods
C. The use of two separate communication protocols
D. Encrypting data at two different network layers
Correct Answer is :
B. Verifying identity using two independent methods