What are the identifiers in user authentication typically based on?
Some examples of authentication controls.
The two broad categories of controls in logical access.
List the common levels of logical access controls.
00
DAYS
HRS
MINS
SECS