Multiple Choice
Verifying the identity of the person or device attempting to access the system is an example of
A) authentication.
B) authorization.
C) identification.
D) threat monitoring.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q79: In recent years,many of the attacks carried
Q80: The most common input-related vulnerability is called
Q81: Security is a technology issue and not
Q82: A system that creates logs of all
Q83: _ is/are an example of a preventive
Q85: According to the Trust Services Framework,the reliability
Q86: Virtualization refers to the ability of<br>A)running multiple
Q87: The steps that criminals take to study
Q88: A well-known hacker started her own computer
Q89: Identify three ways users can be authenticated