MCQOPTIONS
Saved Bookmarks
| 1. |
Many applications use _________________, where two independent factors are used to identify a user. |
| A. | Two-factor authentication |
| B. | Cross-site request forgery |
| C. | Cross-site scripting |
| D. | Cross-site scoring scripting |
| Answer» B. Cross-site request forgery | |