Describe the three authentication types and provide an example of.docx
1. Describe the three authentication types and provide an example of
CYS566 securing Enterprise infrastructureDescribe the three authentication types and
provide an example of each. How might each method be defeated when used alone? How
can the various types be used together to improve the protection of the system?