__________ is the process of validating the claimed identity of an end computer or network user or a device such as a host computer, router, or some other physical element.

A. authentication
B. authorization
C. privilege
D. A and B
E. none of the above


Answer: A

Computer Science & Information Technology

You might also like to view...

Compare and contrast connection-oriented services and connectionless services.

What will be an ideal response?

Computer Science & Information Technology

In addition to detecting fraud, computer forensics can actually prevent fraud by acting as a(n)

A) Extension of management oversight B) Prosecution resource C) Deterrent D) Clearinghouse of information

Computer Science & Information Technology

The LISP language was developed specifically for manipulating lists.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

This is testing a program by a select group of potential users.

A. manual testing B. desk checking C. beta testing D. attempt at translation

Computer Science & Information Technology