Fill in the blank: ____ is the technology used to establish a user’s request to access a server.

Assets, Threats, and Vulnerabilities | Weekly challenge 2 Quiz | 

Fill in the blank: ____ is the technology used to establish a user’s request to access a server.

  • Digital certificates
  • OAuth
  • API tokens
  • Basic auth

 

Leave a Comment