Question

The process of verifying the real identity of an individual, computer, computer program, or EC website best defines

A) vulnerability assessment.

B) security audit.

C) authentication.

D) authorization.

Answer

This answer is hidden. It contains 1 characters.