Authentication Factors and MFA Traps

Key Takeaways

  • MFA is strongest when factors come from different categories: know, have, are, do, or somewhere you are.
  • A password plus a PIN is not true MFA because both are knowledge factors.
  • Push-based MFA can be abused by fatigue attacks, so number matching and phishing-resistant authenticators matter.
  • Biometrics are convenient identifiers but require fallback, privacy protection, and anti-spoofing controls.
  • Risk-based authentication adjusts requirements based on context such as device, location, behavior, and sensitivity.
Last updated: April 2026

Authentication Factors and MFA Traps

Authentication proves an identity claim. Security+ questions often include two credentials and ask whether they are actually different factor types.

Factor categoryMeaningExamples
Something you knowSecret remembered by the subjectPassword, passphrase, PIN
Something you havePhysical or logical authenticator held by the subjectSmart card, hardware security key, authenticator app, OTP token
Something you areBiometric traitFingerprint, face, iris
Something you doBehavioral patternTyping rhythm, gesture pattern
Somewhere you areLocation signalManaged office network, geolocation, impossible travel check

MFA Quality Ladder

MethodStrength noteMain trap
Password onlySingle factorCredential theft gives access
Password plus PINStill one factor typeBoth are something you know
Password plus SMS codeBetter than password aloneSIM swap, interception, phishing risk
Password plus app pushCommon and usablePush fatigue or accidental approval
Password plus TOTP appBetter resistance to random push approvalStill phishable on fake login pages
FIDO2/WebAuthn security keyStrong phishing resistanceRequires enrollment and recovery planning
Smart card with PINStrong when private key remains on cardCard loss and PIN handling need controls

Trap Callout: Two Steps Are Not Always MFA

Two prompts do not automatically mean multifactor authentication. A password, a security question, and a PIN are all knowledge. A password plus a smart card is MFA. A password plus a fingerprint is MFA. A smart card plus a hardware key may be two possessions, but it is not two different factor categories.

MFA Attack Clues

Scenario clueLikely issueBetter control
User receives repeated push prompts late at nightMFA fatigueNumber matching, rate limiting, user reporting
User enters code into fake portalPhishing of OTPFIDO2/WebAuthn or certificate-based auth
Attacker ports victim phone numberSIM swapAvoid SMS for high-risk access
Login from two countries within minutesImpossible travelRisk-based challenge or block
New unmanaged laptop accesses payrollDevice posture riskConditional access and device compliance

Scenario Walkthrough

A help desk technician receives a call from a person claiming to be a locked-out executive. The caller knows the executive's employee ID and asks for MFA reset. The best response is not to trust the caller's knowledge. Use an approved identity verification and reset workflow, require manager or out-of-band approval if policy says so, and log the reset. MFA reset is a high-risk identity event.

Quick Drill

CombinationIs it MFA?Why
Password plus PINNoTwo knowledge factors
Password plus TOTP appYesKnowledge plus possession
Smart card plus fingerprintYesPossession plus biometric
Password plus security questionNoTwo knowledge factors
FIDO2 key with user verificationYesPossession plus local verification, often phishing resistant
Test Your Knowledge

A login requires a password and a four-digit PIN. How should this be classified?

A
B
C
D
Test Your Knowledge

Employees are approving unexpected push notifications because attackers repeatedly trigger MFA prompts until someone accepts. Which mitigation best addresses this?

A
B
C
D
Test Your KnowledgeMulti-Select

Which methods are generally stronger against phishing than one-time codes typed into a web page? Choose two.

Select all that apply

FIDO2 security key
WebAuthn passkey with origin binding
SMS OTP
Security question