👤

Which one of the following is not a good technique for performing authentication of an end user?

A. Password
B. Biometric scan
C. Identification number
D. Token