describe two ways that two factor authentication restrict user access to computer systems​