Apple's Touch ID on both the iPhone and iPad. Apple devices allowing a user to access and use their device after a facial scan (facial recognition). These are examples of which of the following? Two factor authentication Artificial intelligence passwords Data analytics derived forms of security Biometrics Output from CRM systems The benefits of using ERP to enhance and implement security.