Which of the following types of authentication models uses a smart card and a User ID/Password for accessing network resources?
which of the following inventory system permissions might be BEST aligned with the least privilege principle for the managers?