What statement describes the authorization component of a AAA implementation?
Verifying that a user is who he says he is
Validating client device credentials against a database
Logging the details of user network behavior in order to review it at a later time
Granting access to specific network services according to a user profile
Implementing a WIPS as a full-time monitoring solution to enforce policies