Which of the following statements about the authentication concept of information security management is
true?
A.
It determines the actions and behaviors of a single individual within a system, and identifies that particular
individual.
B.
It ensures that modifications are not made to data by unauthorized personnel or processes .
C.
It establishes the users’ identity and ensures that the users are who they say they are.
D.
It ensures the reliable and timely access to resources.