You work as a security manager for Company Inc. An individual is connecting to your corporate internal
network over the Internet. You have to ensure that he is not an intruder masquerading as an authorized
user. Which of the following technologies will you use to accomplish the task?
A.
Two-factor authentication
B.
IP address packet filtering
C.
Intrusion detection system (IDS)
D.
Embedded digital signature