Assets, Threats, and Vulnerabilities | Weekly challenge 2 Quiz |
What are the two most common forms of identification used by authentication systems? Select two answers.
- Password
- Facial scan
- Fingerprint
- Username
Assets, Threats, and Vulnerabilities | Weekly challenge 2 Quiz |
What are the two most common forms of identification used by authentication systems? Select two answers.