 
			 
			MCQOPTIONS
 Saved Bookmarks
				| 1. | Many applications use _________________, where two independent factors are used to identify a user. | 
| A. | Two-factor authentication | 
| B. | Cross-site request forgery | 
| C. | Cross-site scripting | 
| D. | Cross-site scoring scripting | 
| Answer» B. Cross-site request forgery | |