Which of the following activities are included in Access Management?
1. Verifying the identity of users requesting access to services
2. Setting the rights or privileges of systems to allow access to authorised users
3. Defining security policies for system access
4. Monitoring the availability of systems that users should have access to
a) 2 and 4 only
b) 1 and 3 only
c) 2 and 3 only
d) 1 and 2 only