Cybersecurity Day - MFA Booth - Set 4
Across
- 1. Login method requiring two or more verification steps
- 4. Application that generates one‑time passcodes using TOTP
Down
- 2. Security protocol enabling strong, password‑free login
- 3. Fraudulent attempt to steal sensitive information by pretending to be a trusted source