To further enhance security on workstations, a security engineer is considering implementing two-factor authentication. Which methods might be the most secure options?
A. Password and security question
B. Password and fingerprint scanner
C. Password and one-time code from a mobile app
D. Password and voice recognition