Which of the following statements about the authentication concept of information security
management is true?
A.
It ensures the reliable and timely access to resources.
B.
It determines the actions and behaviors of a single individual within a system, and
identifies that particular individual.
C.
It ensures that modifications are not made to data by unauthorized personnel or
processes .
D.
It establishes the users’ identity and ensures that the users are who they say they
are.