Objects that a user possesses for the purpose of user authentication are called ______
Fill in the blank(s) with the appropriate word(s).
tokens
Computer Science & Information Technology
Fill in the blank(s) with the appropriate word(s).
tokens