How does authentication differ from authorization?
A. Authentication is used to record what resource a user accesses, and authorization is used to determine what resources a user can access.
B. Authentication verifies the identity of a person accessing a network, and authorization determines what resource a user can access.
C. Authentication is used to determine what resources a user is allowed to access, and authorization is used to track what equipment is allowed access to the network.
D. Authentication is used to verify a person's identity, and authorization is used to create syslog messages for logins.
A. Authentication is used to record what resource a user accesses, and authorization is used to determine what resources a user can access.
B. Authentication verifies the identity of a person accessing a network, and authorization determines what resource a user can access.
C. Authentication is used to determine what resources a user is allowed to access, and authorization is used to track what equipment is allowed access to the network.
D. Authentication is used to verify a person's identity, and authorization is used to create syslog messages for logins.