Which of the following describes what has occurred after a user has successfully gained access to a secure system?

Which of the following describes what has occurred after a user has successfully gained access to a secure system?

Which of the following describes what has occurred after a user has successfully gained access to a secure system?

A.
Authentication

B.
Authenticity

C.
Identification

D.
Confidentiality



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Ric

Ric

Initially I misunderstood the question, reading it as what will happen next. However, after reading the question several times, I finally caught on to the question’s real intent. Agreed, the step that occurred was “Authentication.”