Which of the following activities best illustrates a user’s authentication control?
A . Identity requests are approved in two steps.
B . Logs are checked for misaligned identities and access rights.
C . Users have to validate their identity with a smart card.
D . Functions can toe performed based on access rights
Answer: C
Latest IIA-CIA-Part3 Dumps Valid Version with 402 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund