204k views
4 votes
Identifiers should be assigned carefully because authenticated identities are the basis for other security services.

True or False

1 Answer

1 vote

Answer:

*Something the individual possesses: Examples include electronic key-cards, smart cards, and physical keys. This type of authenticator is referred to as a token.

Step-by-step explanation:

User Bryan Lee
by
4.3k points