How do organizations verify identity, grant the correct level of access, and prevent unauthorized use of accounts and systems?
Examples: password, MFA, biometrics.
Examples: file permissions, admin rights, access to apps.
Exam trap:
Many questions reverse the terms — always check if the question is about “who you are” or “what you can do.”
Passwords, PINs, passphrases.
Phone, smart card, hardware token, key fob.