Quick Reference
MFA requires two or more factors from different categories to authenticate: something you know (password, PIN), something you have (authenticator app, hardware token, smart card), something you are (fingerprint, face, iris). The key word is different — two passwords is not MFA. MFA defeats credential theft attacks because a stolen password alone cannot satisfy the second factor.

The Three Authentication Factors

Authentication factors are categories of proof that verify your identity. MFA works because compromising one factor category does not compromise another — a stolen password doesn't give an attacker your fingerprint, and stealing your phone doesn't reveal your password.

🧠
Something You Know
Knowledge factor
Passwords, PINs, passphrases, security questions. The most common factor — and the weakest when used alone. Susceptible to phishing, credential stuffing, brute force, and password reuse attacks. Must always be combined with at least one other factor.
📱
Something You Have
Possession factor
Authenticator apps, hardware tokens (YubiKey), smart cards, OTP via SMS. Requires physical possession of a device or object. An attacker who steals your password still can't authenticate without also stealing your phone or token.
👆
Something You Are
Inherence factor
Fingerprint, face recognition, iris scan, voice recognition, vein pattern. Biometric factors are highly convenient but raise privacy concerns and can occasionally be spoofed — high-quality photos can fool some face recognition systems.
📍
Somewhere You Are
Location factor
GPS location, IP geolocation, network location. A fourth factor sometimes cited on the exam. Restricts access to users within a physical location or network range. Common in Zero Trust — "deny access from outside the corporate network unless VPN connected."

MFA Types — TOTP, HOTP, Push, and Hardware Tokens

TypeHow It WorksStrengthExam Key Point
TOTPTime-based one-time password — generates a 6-digit code every 30 seconds using a shared secret + current time. Google Authenticator, Authy.StrongCode expires in 30 seconds — replay attacks fail
HOTPHMAC-based one-time password — generates a code based on a counter that increments with each use. Older RSA SecurID tokens use this.ModerateCounter-based, not time-based — codes don't expire automatically
Push NotificationApp on your phone receives a push asking "Approve this login?" — you tap Approve or Deny. Microsoft Authenticator, Duo.StrongVulnerable to MFA fatigue attacks (push bombing)
Hardware TokenPhysical device (YubiKey, RSA SecurID) generates codes or uses USB/NFC to authenticate. Cannot be phished remotely.Very StrongMost phishing-resistant MFA — code never entered manually
SMS OTPOne-time code sent via text message. Weakest MFA option — susceptible to SIM swapping.WeakBetter than no MFA, but weakest option on exam questions
FIDO2 / PasskeysCryptographic key pair — private key stays on device, public key with server. No password transmitted. WebAuthn standard.StrongestPhishing-resistant by design — no shared secret to steal

FIDO2 and Passkeys — the Future of Authentication

FIDO2 (Fast IDentity Online 2) is the authentication standard behind passkeys. Instead of transmitting a password or OTP code, FIDO2 uses public-key cryptography: your device holds a private key that never leaves it, and the server holds the corresponding public key. When you authenticate, your device signs a challenge with the private key — the server verifies the signature without ever seeing the private key or anything that could be stolen and replayed.

This makes FIDO2 inherently phishing-resistant. Even if an attacker tricks you into visiting a fake login page, there's no password or code to capture — the private key never leaves your device, and the cryptographic challenge is domain-specific (a fake site can't use the signature generated for the real site). The exam doesn't test FIDO2 implementation details deeply, but you should know it's the most phishing-resistant authentication method available.

MFA Fatigue Attacks — Push Bombing

⚠️ Attack to Know for the Exam

MFA fatigue (push bombing) is an attack where an adversary who has stolen valid credentials repeatedly sends MFA push notifications to the victim's phone, hoping the victim approves one out of frustration, confusion, or distraction. The Uber breach in 2022 succeeded largely through MFA fatigue — the attacker sent continuous Duo pushes until the victim approved one.

Mitigations: Number matching (the push shows a number you must match to a number on screen — prevents blind approval), phishing-resistant MFA (FIDO2/hardware tokens eliminate push notifications entirely), rate limiting push notifications, and user awareness training.

Smart Cards and PIV

Smart cards combine something you have (the physical card with an embedded chip) and something you know (the PIN to unlock it), making them inherently two-factor. The US government's PIV (Personal Identity Verification) card is a smart card standard used for physical and logical access to federal facilities and systems. CAC (Common Access Card) is the DoD equivalent. Smart cards are covered on Security+ because they appear in enterprise and government access control scenarios — the exam expects you to know that a smart card requires a PIN to activate, making it two-factor by itself.

💡 Exam Trap: Two Passwords ≠ MFA

MFA requires factors from different categories. A password plus a security question is not MFA — both are knowledge factors. A password plus an authenticator app code is MFA — knowledge + possession. The exam will test this distinction with answer choices designed to trip up candidates who confuse "two steps" with "two factors."

Where MFA Fits in Zero Trust and IAM

MFA is a foundational control in Zero Trust architecture — "never trust, always verify" means every authentication attempt must be verified with strong factors regardless of network location. Even users inside the corporate network must MFA. Zero Trust policies often add additional context — if a user's location, device posture, or access pattern is unusual, step-up authentication can require a stronger second factor or re-authentication. MFA also directly satisfies compliance requirements: PCI-DSS requires MFA for remote access to the cardholder data environment, and HIPAA guidance recommends MFA for systems storing PHI.

Exam Scenarios

An attacker obtained an employee's username and password through phishing. They are now unable to access the corporate VPN. What control is preventing access?
Answer: Multi-factor authentication (MFA). The stolen password alone satisfies only the knowledge factor. Without the second factor (possession or inherence), authentication fails. This is the core value proposition of MFA — credential theft alone is insufficient.
A security team reports that employees are receiving dozens of unexpected MFA push notifications they did not initiate, and one employee approved a push by mistake. What attack is occurring?
Answer: MFA fatigue attack (push bombing). The attacker has valid credentials and is flooding the victim with push notifications hoping for accidental approval. Mitigations include switching to number-matching MFA or phishing-resistant FIDO2/hardware tokens.
A company requires the most phishing-resistant authentication method available for privileged accounts. Which MFA type should they implement?
Answer: FIDO2 hardware security keys (such as YubiKey). FIDO2 is phishing-resistant by design — the private key never leaves the device and authentication is domain-bound. No secret can be captured by a phishing page. Hardware tokens are the strongest option on the exam when phishing resistance is the requirement.
A user is issued a government-issued card with an embedded chip that requires a PIN before granting access to workstations. How many authentication factors does this represent?
Answer: Two factors. The smart card (PIV/CAC) represents something you have; the PIN represents something you know. A smart card used with a PIN is MFA by itself — you need both the physical card and knowledge of the PIN.

Related Articles