Chapter-2 Identification & Authentication Introduction To secure a network the first step is to avoid unauthorized access to the network. This can be achieved with any…