Which of the following types of authentication BEST describes providing a username, password and undergoing a thumb print scan to access a workstation?
Which of the following BEST describes the baseline process of securing devices on a network infrastructure?