Verifying the identity of the person or device attempting to access the system is an example of

A) authentication.
B) authorization.
C) identification.
D) threat monitoring.

Answer: A

Business

You might also like to view...

Collecting information and providing feedback to employees about their behavior is called _____.

A. internship B. job enlargement C. assessment D. job rotation E. externship

Business

A warranty is a contract in which the seller guarantees the nature of the product.

a. true b. false

Business