The security principle known as ________ requires that individuals must confirm their identity.

A. attenuation
B. validation
C. authentication
D. authorization


Answer: C

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. The delay parameter in the Timer constructor is the amount of time between action events, measured in milliseconds. 2. The play method will load and play a sound file once, then release it for garbage collection. The getAudioClip method will load the sound file and may assign the location of the sound file to a variable so it may be invoked many times. 3. The Applet class requires that you write a constructor to create an object of the class. 4. Some browsers do not directly support the Swing classes of applets. 5.Whenever you need a component of any type to be painted, call the paint method.

Computer Science & Information Technology

What are the three types of VLANs? (Select three.)

a. Port-based VLAN b. Tag-based VLAN c. Pd-based VLAN d. Protocol-based VLAN e. Label-based VLAN f. Routing-based VLAN

Computer Science & Information Technology

If you must write down your password, what should you do with it?

A) Put it in your desk drawer B) Put it on a sticky note on your monitor C) Put it under your keyboard D) Put it in a safe place

Computer Science & Information Technology

The value returned by a called function is ____ converted to the data type declared in the function declaration.

A. usually B. always C. conditionally D. never

Computer Science & Information Technology