1.

Many applications use _________________, where two independent factors are used to identify a user.

A. Two-factor authentication
B. Cross-site request forgery
C. Cross-site scripting
D. Cross-site scoring scripting
Answer» B. Cross-site request forgery


Discussion

No Comment Found