Home / Aptitude Tests / Computer Science / Which of the followi...

Which of the following methods is not suitable for securi...