If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of ______.
(a) Authentication
(b) Automation
(c) Firewall
(d) Encryption
(e) Decryption
Answers
Answered by
4
here is your answer,
authentication
One of the front-line defenses should be network access control (NAC) and its ability to restrict network access to devices and users that are authorized and authenticated.
authentication
One of the front-line defenses should be network access control (NAC) and its ability to restrict network access to devices and users that are authorized and authenticated.
Similar questions