Anonymous asked 7/28/2010 Which Of The Following Portrays Authentication Based On Something The User Has?