Verifying the identity of the person or device attempting to access the system is an example of
A) authentication.
B) authorization.
C) identification.
D) threat monitoring.
Answer: A
Business
You might also like to view...
Collecting information and providing feedback to employees about their behavior is called _____.
A. internship B. job enlargement C. assessment D. job rotation E. externship
Business
A warranty is a contract in which the seller guarantees the nature of the product.
a. true b. false
Business