Which security action should be finished before access is given to the network?
A.
Identification and authorization
B.
Identification and authentication
C.
Authentication and authorization
D.
Authentication and password
Which security action should be finished before access is given to the network?
Which security action should be finished before access is given to the network?
A.
Identification and authorization
B.
Identification and authentication
C.
Authentication and authorization
D.
Authentication and password