Watch this video on YouTube
Which of the following is a logical access control method that verifies the identity of a user before granting access to a system?