Establishing authentication procedures is a common cybersecurity goal because ______. a) It prevents unauthorized access to sensitive information. b) It enhances network speed and efficiency. c) It reduces the need for encryption. d) It simplifies the management of cybersecurity policies.