A corporation is concerned that their code is being stolen by a different company, so they implement new procedures for logging in that include biometric scans so they can ensure only authorized programmers have access to the code. What is this an example of?(1 point)
Responses
zero trust
zero trust
authentication
authentication
least trust
least trust
encryption
1 answer
authentication