amaritn1389 amaritn1389 Today at 2:19 PM Computers and Technology Answered which of the following is the least likely consequence if the process of user authentication is compromised?