Proper authentication procedures should be followed for
(a) Integrity.
(b) Confidentiality.
(c) Access control
(d) None of the above
Answers
Answered by
2
Answer:
a)Integrity
but I'm not sure
Similar questions