A corporation is concerned that their code is being stolen by a different company, so they implement new procedures for logging in that include biometric scans so they can ensure only authorized programmers have access to the code. What is this an example of?(1 point)

Responses

zero trust
zero trust

authentication
authentication

least trust
least trust

encryption

authentication