John works in an organization. He is trying to insert a password to log in his account on the organization's login website. Which of the following best describes the use of passwords for access control?

A. Authorization
B. Authentication
C. Identification
D. Auditing


Answer: B. Authentication

Computer Science & Information Technology

You might also like to view...

One way to sparsify a proximity matrix is the following: For each object (row in the matrix), set all entries to 0 except for those corresponding to the objects k-nearest neighbors. However, the sparsified proximity matrix is typically not symmetric.

(a) If object a is among the k-nearest neighbors of object b, why is b not guaranteed to be among the k-nearest neighbors of a? (b) Suggest at least two approaches that could be used to make the sparsi- fied proximity matrix symmetric.

Computer Science & Information Technology

The class ObjectInputStream contains all of the following methods except:

(a) readLine() (b) readChar() (c) readObject() (d) readInt()

Computer Science & Information Technology

When you drag an action or message block to a new position, a(n) ________ displays where the box can be dropped

A) select icon B) orange line C) Access logo D) mouse arrow

Computer Science & Information Technology

DUAL uses the ____ topology table to track the status of all links in a network.

A. EIGRP B. OSPF C. RIPv1 D. RIPv2

Computer Science & Information Technology