Q77. In information security, user authentication is typically based on a number of distinct categories of factors. How many primary categories are widely recognized?Computer — Security, Copyright and the Law — Question 77 of 82A. 2B. 3C. 4D. 5E. None of thesePractice more Computer MCQs for entrance exam preparation on Examora.io.← Previous Question Next Question →