Accepted Answer
By analyzing the necessary login credentials, which might include passwords, personal identification numbers, biometric scans, security tokens, or other authentication elements, logical access control systems carry out identity authentication and authorisation of users and entities.Unauthorized users are prevented from accessing information resources by access controls. Authentication and authorisation are two of the key components of these controls. The process of authentication verifies the identity of the user who requests access. Biometrics is one illustration. The criteria set by the custodian or system administrator will be used by rule-based access control to allocate roles to users on a dynamic basis. Rule-Based Access Control would be the best option, for instance, if someone is only permitted access to files during specific times of the day.Learn more about authentication here-https://brainly.com/question/28398310#SPJ4