What access management concept defines what rights or privileges a user has?

A. Identification
B. Accountability
C. Authorization
D. Authentication


Answer: C. Authorization

Computer Science & Information Technology

You might also like to view...

"The input to the encryption algorithm is the XOR of the next 64 bits of plaintext and the preceding 64 bits of ciphertext" is a description of __________ mode.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If you had to write a function named Func that was passed one integer and one double, and “returned” a string and a double, which of these prototypes would NOT work?

A. double Func(string *ps, int a, double d); B. void Func(int a, double b, string &rs, string &rd); C. string Func(double *pd, int a, double d); D. void Func(int a, double d, string s, double *pd);

Computer Science & Information Technology

In a query, the phrase ________ tests whether the field contains a value, returning the records if there is no value

A) Is Empty B) Is Not Empty C) Is Null D) Is Not Null

Computer Science & Information Technology

Which questions need to be answered in user-centered requirements elicitation?

What will be an ideal response?

Computer Science & Information Technology