In the context of physical access control, what is known as the process of verifying user identities?
A. Authentication
B. Authorization
C. Accounting
D. Encryption
E. Compression
F. None of the choices.
A. Authentication
B. Authorization
C. Accounting
D. Encryption
E. Compression
F. None of the choices.