ICT (Year 8)

Internet Security

Which of the following is a method of authenticating a user?