Which of the following is a popular technique used to protect data from unauthorized access?
Encryption
Firewall protection
Authentication

Information Security Exercises are loading ...