________ involve using a physical attribute such as a fingerprint for authentication

a. Backdoors
b. Rootkits
c. Biometrics
d. Trojan horses

C

Computer Science & Information Technology

You might also like to view...

An object's ____ thus consists of ____ values.

A. position; three B. point of view; three C. position; six D. point of view; six

Computer Science & Information Technology

Alice does not provide a ____ statement.

A. doInOrder B. forAllTogether C. doTogether D. do

Computer Science & Information Technology