During a routine check, a system administrator identifies unusual activity indicating an intruder within a firewall. Which of the following controls has MOST likely been compromised?
A. Identification
B. Data integrity
C. Data validation
D. Authentication
A. Identification
B. Data integrity
C. Data validation
D. Authentication