42.0k views
0 votes
Verifying the identity of the person or device attempting to access the system is an example of

a. authentication.
b. authorization.
c. identification.
d. threat monitoring.

1 Answer

4 votes

Final answer:

Verifying the identity of the person or device attempting to access the system is an example of authentication.

Step-by-step explanation:

The correct answer is a. authentication. Verifying the identity of the person or device attempting to access the system is a part of the authentication process. Authentication ensures that the individual or device is who they claim to be by using various methods such as passwords, biometrics, or security tokens. It is an important step in ensuring the security of the system.

User Rieckpil
by
7.6k points