Chapter 3 – Identification and Authentication Section 2 – Authentication Techniques Certified Information Systems Security Officer P a g e | 134 ©Mile2 – All Rights Reserved - v18