Assets, Threats, and Vulnerabilities | Weekly challenge 2 Quiz |
Fill in the blank: ____ is the technology used to establish a user’s request to access a server.
Digital certificates- OAuth
API tokens- Basic auth
Assets, Threats, and Vulnerabilities | Weekly challenge 2 Quiz |
Fill in the blank: ____ is the technology used to establish a user’s request to access a server.