Which of the following activities best illustrates a user’s authentication control?

Which of the following activities best illustrates a user’s authentication control?
A . Identity requests are approved in two steps.
B . Logs are checked for misaligned identities and access rights.
C . Users have to validate their identity with a smart card.
D . Functions can toe performed based on access rights

Answer: C

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments