1.

If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of

A. Authentication
B. Automation
C. Firewall
D. Encryption
E. Decryption
Answer» B. Automation


Discussion

No Comment Found