The process of verifying the real identity of an individual, computer, computer program, or EC website best defines
A) authorization.
B) authentication.
C) vulnerability assessment.
D) security audit.
Answer: B
Quiz, Objective, Multiple Choice Question (MCQ), Test Bank Solution and Short Answers.