During a routine check, a system administrator identifies unusual activity indicating an intruder within a firewall. Which of the following controls has MOST likely been compromised?
A. Authentication
B. Identification
C. Data validation
D. Data integrity
A. Authentication
B. Identification
C. Data validation
D. Data integrity