Verifying the identity of the person or device attempting to access the system is an example of
A) authentication.
B) authorization.
C) identification.
D) threat monitoring.
A
Business
You might also like to view...
Seattle's Northwest Hospital and Medical Center was attacked by malware that was able to enter their network through a Windows flaw
Indicate whether the statement is true or false
Business
ERP systems make it ________ to use and share information
A) easier B) harder C) controversial D) necessary
Business