luzroselyguillen luzroselyguillen 13-05-2024 Engineering Answered A software company is planning to implement an authentication process that requires human characteristic identification for authenticating people. Which of the following authentication mechanisms should they implement?