Cybersecurity Day - MFA Booth - Set 2

1234
Across
  1. 2. Login method requiring two or more verification steps
  2. 3. One‑time passcode generated using a counter
  3. 4. Fraudulent attempt to steal sensitive information by pretending to be a trusted source
Down
  1. 1. Login method using fingerprint or facial recognition