You work as a security manager for Company Inc. An individual is connecting to your corporate internal network over the Internet. You have to ensure that he is not an intruder masquerading as an authorized user. Which of the following technologies will you use to accomplish the task?
A.
Two-factor authentication
B.
IP address packet filtering
C.
Intrusion detection system (IDS)
D.
Embedded digital signature