When a user attempts to log into a system, two things occur: identification and authentication. What happens in the identification phase of an access control system?
Select one:
a. The system infers the user's identity
b. The system confirms the user's identity
c. The user states their supposed identity
d. The system states who it believes the unknown user to be