Answer:
c) To protect against unauthorized access
Step-by-step explanation:
Authentication procedures are put in place to ensure that only authorized users can access a system, network, or resource. By requiring users to prove their identity through various authentication methods, such as passwords, biometrics, or multi-factor authentication, organizations can safeguard their systems and data from unauthorized access