A corporation is concerned that their code is being stolen by a different company, so they implement new procedures for logging in that include biometric scans so they can ensure only authorized programmers have access to the code. What is this an example of?

A. zero trust
B. least trust
C. authentication
D. encryption

C. authentication