Multiple Choice
Verifying the identity of the person or device attempting to access the system is
A) Authentication
B) Authorization
C) Identification
D) Threat monitoring
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q10: All employees of E.C.Hoxy are required to
Q22: Which of the following is not one
Q26: Which of the following descriptions is not
Q35: Which of the following is commonly true
Q54: One way to circumvent the counterfeiting of
Q71: The AICPA and the CICA have created
Q73: Information encrypted with the creator's private key
Q74: What three factors determine the strength of
Q78: Giving users regular,periodic reminders about security policies
Q81: What are three ways users can be