Examples of something the individual possesses would include cryptographic keys, electronic keycards, smart cards, and physical keys. This type of authenticator is referred to as a __________ .
Fill in the blank(s) with the appropriate word(s).
token
Computer Science & Information Technology