Why is establishing authentication procedures a common cybersecurity goal?
Multiple Choice
O Authorizing prospective users, processes, or devices to access resources is complicated and requires a background check.
O Allowing untrained users to access any systems, data, and resources can make these IT assets more susceptible to damage.
O Verifying that users are authorized to access systems, data, and resources is fundamental to preventing their unauthorized use.
O Testing users, processes, and devices before giving them access to resources helps prevent errors from being introduced.