Q: 5
In an authentication tree process, considering best practice, where can the collected context data for
mobile devices be persisted for subsequent risk analysis?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.