The process of obtaining a subject’s proven identity is known as:

a. Enrollment
b. Identification
c. Authentication
d. Authorization

c. Authentication

Computer Science & Information Technology

You might also like to view...

Distinguish between escapable and inescapable costs. Give an example.

What will be an ideal response?

Computer Science & Information Technology

A(n) ____________________ converts the local area network data into wide area network data.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology