Home » Computer » Computer Security » Question
  1. If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of
    1. Authentication
    2. Automation
    3. Firewall
    4. Encryption
    5. Decryption
Correct Option: A

NA



Your comments will be displayed only after manual approval.