Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?

Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?

Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?

A.
Authorization

B.
Authentication

C.
Kerberos

D.
Mandatory Access Control



Leave a Reply 0

Your email address will not be published. Required fields are marked *