Multiple Choice
Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be. This process of providing proof is known as ____.
A) authorization
B) encryption
C) cryptography
D) authentication
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q19: _ attacks are designed to deny wireless
Q20: What are the problems of using community
Q21: With wireless CSMA/CA the amount of time
Q22: In a _ attack, an attacker attempts
Q23: The Anti-Spyware Coalition defines _ as technologies
Q25: DoS attacks are rare against wired network
Q26: Most successful wireless DoS attacks are performed
Q27: Authentication can be performed based on what
Q28: Match each item with an statement below:
Q29: In a _ attack, each word from