Multiple Choice
Verifying the identity of the person or device attempting to access the system is
A) authentication.
B) authorization.
C) identification.
D) threat monitoring.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q23: Information technology managers are often in a
Q29: This is an authorized attempt by an
Q32: Which of the following is an example
Q34: When new employees are hired by Folding
Q38: This protocol specifies the procedures for dividing
Q56: Which of the following is an example
Q85: According to the Trust Services Framework,the reliability
Q89: Identify three ways users can be authenticated
Q91: The security technology that evaluates IP packet
Q96: There are "white hat" hackers and "black