Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?
A.
Authorization
B.
Authentication
C.
Kerberos
D.
Mandatory Access Control
Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?
Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?
A.
Authorization
B.
Authentication
C.
Kerberos
D.
Mandatory Access Control