The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authentication and __________ process.

Sagot :

Answer:

Authentication

Explanation:

Answer:

The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authentication and _authentication_ process.

Explanation:

hope it help uniee

can you please brainliest answer ❤