Computer Science, asked by rakeshtiwari73568, 4 months ago

Proper authentication procedures should be followed for
(a) Integrity.
(b) Confidentiality.
(c) Access control
(d) None of the above​

Answers

Answered by mrbeastpewds
2

Answer:

a)Integrity

but I'm not sure

Similar questions