Alice was working on her major project: she saved all her confidential files and locked her laptop. Bob wanted to access Alice's laptop for his personal use but was unable to access the laptop due to biometric authentication.
Which of the following network defense approaches was employed by Alice on her laptop?
Jamal
5 months agoAnjelica
5 months agoThurman
5 months agoRaylene
5 months agoMicaela
6 months agoLouisa
6 months agoLisbeth
6 months agoCarla
6 months agoLisha
6 months agoChantell
6 months agoFrank
6 months agoVal
11 months agoDenise
9 months agoAhmed
9 months agoMabel
10 months agoRemedios
10 months agoSophia
11 months agoArletta
10 months agoKrissy
10 months agoFrance
10 months agoThomasena
11 months agoAshton
10 months agoTerrilyn
10 months agoLashawna
11 months agoLynsey
12 months agoGeorgene
12 months agoDorothy
12 months agoAvery
12 months agoOlene
11 months agoJohnna
11 months agoTony
1 year agoLoren
1 year agoDaryl
1 year ago