Which of the following are often considered as the first defensive line in protecting a typical data and information environment?
A. certificates
B. security token
C. password
D. biometrics
E. None of the choices.
A. certificates
B. security token
C. password
D. biometrics
E. None of the choices.