Alice was working on her major project: she saved all her confidential files and locked her laptop. Bob wanted to access Alice's laptop for his personal use but was unable to access the laptop due to biometric authentication.
Which of the following network defense approaches was employed by Alice on her laptop?
Val
27 days agoRemedios
12 hours agoSophia
1 months agoThomasena
1 months agoAshton
10 days agoTerrilyn
13 days agoLashawna
20 days agoLynsey
2 months agoGeorgene
2 months agoDorothy
2 months agoAvery
2 months agoOlene
19 days agoJohnna
1 months agoTony
2 months agoLoren
2 months agoDaryl
2 months ago