cedavenport4270 cedavenport4270 27-12-2023 Computers and Technology contestada The use of password to verify that a person is who they purport to be before they are granted access to confidential data is:a. audit trailb. encryptionc. firewalld. user authentication