The correct answer to this question is D, Authentication bypass. This bypass can prevent hackers from installing malware on the device or taking data. Having a unique username can make it harder on the hacker to log into the device.
There are many other ways to prevent authentication bypass. Like having a unique username, having a unique password is just as important. If a hacker is able to get the username, the unique password can prevent them from getting any further than the log in screen. Another way to prevent this is having files locked and secured, requiring a unique password to access them.
The answer to this is letter D. Authentication Bypass may sometimes occur when there are usernames that are almost similar to each other. There are some people who try their best to copy certain usernames and they will do it in such a way that the system may not always recognize the difference. Systems are more high tech now so it will be harder to do this.
Some are able to skip the login page and just enter pages that they are not authorized to view. This can be a problem for people who are trying to keep some information confidential. When this occurs, the person will automatically reach a page that should only be accessed after the person has logged in successfully.