Identification and authentication is part of the _______ class of security controls.

A. technical B. operational
C. management D. none of the above

A. technical

Computer Science & Information Technology

You might also like to view...

A memory address is

a. Where a variable is stored b. Where the computer is located c. A step in the program. d. Where the CPU is stored.

Computer Science & Information Technology

Name the four basic activities that are involved in a software development process.

What will be an ideal response?

Computer Science & Information Technology