__________ is verification that the credentials of a user or other system entity are valid.

A. Adequacy B. Authentication

C. Authorization D. Audit


B. Authentication

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. A pyramid structure should be used if the analyst believes the interviewee needs to warm up to the topic. 2. A funnel-shaped question sequence is useful when the interviewee feels emotionally about the topic and needs freedom to express those emotions. 3. The diamond structure has the advantage of taking less interviewer time. 4. The longer you wait to write up your interview, the more suspect the quality of the data becomes.

Computer Science & Information Technology

Why does a greedy algorithm not use or require caching or memoization?

a. Because it makes an optimum selection locally that reaches a global optimum b. Because the greedy algorithm approach is recursive c. Because it examines all possible solutions in the solution space d. Because it recombines all the local optimal choices in the recombination step at the end

Computer Science & Information Technology

Which of the following are used to describe the behaviors of waves as they propagate?  (Choose all that apply.)

A. diffraction B. scattering C. resistance D. absorption

Computer Science & Information Technology

Which term describes the ability of  server virtualization in cloud computing to add virtual machines to meet increased processing demands?

A. shared disk access B. RAID C. multiple hypervisors D. rapid provisioning

Computer Science & Information Technology