Verifying the identity of the person or device attempting to access the system is an example of

A) authentication.
B) authorization.
C) identification.
D) threat monitoring.

A

Business

You might also like to view...

Seattle's Northwest Hospital and Medical Center was attacked by malware that was able to enter their network through a Windows flaw

Indicate whether the statement is true or false

Business

ERP systems make it ________ to use and share information

A) easier B) harder C) controversial D) necessary

Business