Sagot :
Answer:
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authentication and _authentication_ process.
Explanation:
hope it help uniee
can you please brainliest answer ❤