CyberProtex - Drag and Drop Game
Drag and Drop: Which of the following methods are used to authenticate a user to a system or network?
Drag and Drop the correct answers from TOP to BOTTOM.
Once you have all of the answers correct you will receive a message.
Drop Correct Answers in the box below: