What is the purpose of authentication components in a network security solution?
A.
to validate the identity of users who connect to the network
B.
to block unwanted connections and content from both internal and external sources
C.
to create virtual connections between validated remote users and a private network
D.
to limit the availability of network resources by defining the usage privileges of authorized users