________ is the process of assessing the identity of each individual claiming to have permission to use a resource.

A. Availability
B. Auditing
C. Authentication
D. Authorizations


C. Authentication

Computer Science & Information Technology

You might also like to view...

sizeof:

a. Is a binary operator. b. Returns the total number of elements in an array. c. Usually returns a double. d. Returns the total number of bytes in a variable.

Computer Science & Information Technology

By default, Java initializes array elements to __________.

a. 0 b. 100 c. -1 d. 1

Computer Science & Information Technology

If you are looking for a particular set of keywords in an exact order enclose your keywords in ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A connector has a yellow ____ handle which alters the path of the line.

A. marker B. adjustment C. connector D. sizing

Computer Science & Information Technology