What is called the verification that the user's claimed identity is valid and is usually implemented through a user password at log-on time?
A. Authentication
B. Identification
C. Integrity
D. Confidentiality
A. Authentication
B. Identification
C. Integrity
D. Confidentiality