Which of the following statements about the authentication concept of information security management is true?
It ensures the reliable and timely access to resources.
It ensures that modifications are not made to data by unauthorized personnel or processes.
It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.
It establishes the users' identity and ensures that the users are who they say they are.
Submit