A security technician is configuring an access management system to track and record user actions. Which of the following functions should the technician configure?
A. Accounting
B. Authorization
C. Authentication
D. Identification
A security technician is configuring an access management system to track and record user actions. Which of the following functions should the technician configure?
A. Accounting
B. Authorization
C. Authentication
D. Identification