Which of the following describes what has occurred after a user has successfully gained access to a secure system?
A.
Authentication
B.
Authenticity
C.
Identification
D.
Confidentiality
You must be logged in to post a comment.
Initially I misunderstood the question, reading it as what will happen next. However, after reading the question several times, I finally caught on to the question’s real intent. Agreed, the step that occurred was “Authentication.”
0
0