The process of obtaining a subject’s proven identity is known as:
a. Enrollment
b. Identification
c. Authentication
d. Authorization
c. Authentication
Computer Science & Information Technology
You might also like to view...
Distinguish between escapable and inescapable costs. Give an example.
What will be an ideal response?
Computer Science & Information Technology
A(n) ____________________ converts the local area network data into wide area network data.?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology