A group of students is developing a program together using a repository. Each student only has access to the code they are working on. What is this an example of?(1 point)

Responses

authentication
authentication

zero trust
zero trust

encryption
encryption

least trust

least trust