__________ is verification that the credentials of a user or other system entity are valid.
A. Adequacy B. Authentication
C. Authorization D. Audit
B. Authentication
You might also like to view...
Answer the following statements true (T) or false (F)
1. A pyramid structure should be used if the analyst believes the interviewee needs to warm up to the topic. 2. A funnel-shaped question sequence is useful when the interviewee feels emotionally about the topic and needs freedom to express those emotions. 3. The diamond structure has the advantage of taking less interviewer time. 4. The longer you wait to write up your interview, the more suspect the quality of the data becomes.
Why does a greedy algorithm not use or require caching or memoization?
a. Because it makes an optimum selection locally that reaches a global optimum b. Because the greedy algorithm approach is recursive c. Because it examines all possible solutions in the solution space d. Because it recombines all the local optimal choices in the recombination step at the end
Which of the following are used to describe the behaviors of waves as they propagate? (Choose all that apply.)
A. diffraction B. scattering C. resistance D. absorption
Which term describes the ability of server virtualization in cloud computing to add virtual machines to meet increased processing demands?
A. shared disk access B. RAID C. multiple hypervisors D. rapid provisioning