ISC Exam Questions

What form of access control does this questions stem from?

Is the person who is attempting to log on really who they say they are? What form of access
control does this questions stem from?

A.
Authorization

B.
Authentication

C.
Kerberos

D.
Mandatory Access Control