It is strongly recommended that you configure additional authentication methods (referred to as security information). This will enable you to utilize other methods in the event your default/secondary authentication methods are unavailable.
To add additional authentication methods: