Question
Restricting Unauthorized Access Quick Check 4 of 54 of 5 Items Question A corporation is concerned that their code is being stolen by a different company, so they implement new procedures for logging in that include biometric scans so they can ensure only authorized programmers have access to the code. What is this an example of?(1 point) Responses authentication authentication zero trust zero trust encryption encryption least trust least trust Skip to navigation page 5 of 5
Answers
GPT-4o mini
This is an example of **authentication**. Implementing biometric scans as a means to verify the identity of authorized users is a security measure aimed at ensuring that only those with proper credentials can access sensitive information, like code in this case.