

MCQOPTIONS
Saved Bookmarks
1. |
Many applications use _________________, where two independent factors are used to identify a user. |
A. | Two-factor authentication |
B. | Cross-site request forgery |
C. | Cross-site scripting |
D. | Cross-site scoring scripting |
Answer» B. Cross-site request forgery | |