E
Editor
Sep 18, 2022
Which of the following is an authentication methodology?
Difficulty: Easy
A:
Access cards
B:
Biometrics
C:
PIN
D:
Piracy
ID: 63273dbbca83163ac3a14987