Which of the following describes what has occurred after a user has successfully gained access to a secure system?
A. Authentication
B. Authenticity
C. Identification
D. Confidentiality
One Comment on “Which of the following describes what has occurred after a user has successfully gained access to a secure sys”
Ricsays:
Initially I misunderstood the question, reading it as what will happen next. However, after reading the question several times, I finally caught on to the question’s real intent. Agreed, the step that occurred was “Authentication.”
Initially I misunderstood the question, reading it as what will happen next. However, after reading the question several times, I finally caught on to the question’s real intent. Agreed, the step that occurred was “Authentication.”
0
0