Math, asked by robinsonterang7167, 1 year ago

If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of ______.
(a) Authentication
(b) Automation
(c) Firewall
(d) Encryption
(e) Decryption

Answers

Answered by harsh5359
4
here is your answer,
authentication
One of the front-line defenses should be network access control (NAC) and its ability to restrict network access to devices and users that are authorized and authenticated.
Similar questions