Identification and authentication is part of the _______ class of security controls.
A. technical B. operational
C. management D. none of the above
A. technical
Computer Science & Information Technology
You might also like to view...
A memory address is
a. Where a variable is stored b. Where the computer is located c. A step in the program. d. Where the CPU is stored.
Computer Science & Information Technology
Name the four basic activities that are involved in a software development process.
What will be an ideal response?
Computer Science & Information Technology