1.

In which of the following situations does file-based authentication become inconvenient.

A. i) and iv)
B. i) and iii)
C. ii) and iii)
D. ii) and iv)View Answer
Answer» D. ii) and iv)View Answer


Discussion

No Comment Found