Which of the following protocols allows a service to authenticate the identity of a user without needing to see a password?
Which of the following malicious software implements itself on the kernel level of any operating system and is hard to detect and delete?