amaritn1389 amaritn1389 29-11-2022 Computers and Technology contestada which of the following is the least likely consequence if the process of user authentication is compromised?