Alice was working on her major project: she saved all her confidential files and locked her laptop. Bob wanted to access Alice's laptop for his personal use but was unable to access the laptop due to biometric authentication.
Which of the following network defense approaches was employed by Alice on her laptop?
Jamal
3 months agoAnjelica
3 months agoThurman
4 months agoRaylene
4 months agoMicaela
4 months agoLouisa
4 months agoLisbeth
4 months agoCarla
5 months agoLisha
5 months agoChantell
5 months agoFrank
5 months agoVal
9 months agoDenise
8 months agoAhmed
8 months agoMabel
8 months agoRemedios
8 months agoSophia
10 months agoArletta
8 months agoKrissy
8 months agoFrance
8 months agoThomasena
10 months agoAshton
9 months agoTerrilyn
9 months agoLashawna
9 months agoLynsey
10 months agoGeorgene
10 months agoDorothy
10 months agoAvery
10 months agoOlene
9 months agoJohnna
10 months agoTony
11 months agoLoren
11 months agoDaryl
11 months ago