Selena is interested in implementing a security mechanism for her e-commerce site. Internet authentication is best implemented by a process called;
A.
Internet authenticating
B.
Logging on
C.
Digital signatures
D.
Signing in
You must be logged in to post a comment.
C
0
0