What is the specific act of checking a user's privileges to understand if they should or should not have access to a page, field, resource, or action in an application?

A. authentication
B. authorization
C. auditing
D. discovery


Answer: B

Computer Science & Information Technology

You might also like to view...

A base/member initialization list produces results that are exactly ________

a) assignment b) redeclaration c) redefinition d) initialization e) output

Computer Science & Information Technology

Calculate the probability of drawing a ace from the deck followed by another ace, if the first card is replaced after it is drawn.

A.
B.
C.
D.
E.

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The selection of recommended controls is not guided by legal requirements. 2. The recommended controls need to be compatible with the organization’s systems and policies. 3. The implementation phase comprises not only the direct implementation of the controls but also the associated training and general security awareness programs for the organization. 4. Appropriate security awareness training for all personnel in an organization, along with specific training relating to particular systems and controls, is an essential component in implementing controls. 5. The IT security management process ends with the implementation of controls and the training of personnel.

Computer Science & Information Technology

________ is a network or Internet delivery technique that does not guarantee delivery of data and treats all packets equally; all packets are forwarded on a first-come, first-served basis; preferential treatment based on priority or other concerns is not provided.

A) Quality of experience (QoE) B) Best effort C) DD code point D) Open Flow meter

Computer Science & Information Technology