Multiple Choice
The process ____________of verifies the credentials of the individual seeking access to a computer resource.
A) identification
B) authentication
C) encryption
D) hardening
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q13: What is a firewall and how do
Q67: Which of these following is a true
Q68: List seven ways safeguards to avoid most
Q69: What are the two main sources of
Q70: Security is rarely breached,and the frequency of
Q71: Why are safeguards costly and sometimes restrictive?
Q73: Human errors and mistakes include accidental or
Q74: Departmental personnel should develop procedures for system
Q76: _is the process of reducing the vulnerabilities
Q77: When hiring for high-sensitivity positions,extensive interviews,references,and background