Which of the following describes what has occurred after a user has successfully gained access to a secure system?
A.
Authentication
B.
Authenticity
C.
Identification
D.
Confidentiality
Which of the following describes what has occurred after a user has successfully gained access to a secure system?
Which of the following describes what has occurred after a user has successfully gained access to a secure system?
A.
Authentication
B.
Authenticity
C.
Identification
D.
Confidentiality
Initially I misunderstood the question, reading it as what will happen next. However, after reading the question several times, I finally caught on to the question’s real intent. Agreed, the step that occurred was “Authentication.”