In most organizations, access to the computer or the network is granted only after the user has
entered a correct username and password. This process consists of 3 steps: identification,
authentication and authorization. What is the purpose of the second step, authentication?

A.
In the second step, you make your identity known, which means you are given access to the
system.
B.
The authentication step checks the username against a list of users who have access to the
system.
C.
The system determines whether access may be granted by determining whether the token
used is authentic.
D.
During the authentication step, the system gives you the rights that you need, such as being
able to read the data in the system.