Which of the following solutions are used for authenticating a user to gain access to systems, applications, and data?
a. Web camera
b. None of the above
c. Voice
d. Digital certificates
e. Headphone devices