A centralized, automated approach to provide enterprise-wide access to resources by employees and other authorized individuals with a focus of defining an identity for each user, associating attributes with the identity, and enforcing a means by which a user can verify identity is __________ .

A. enterprise management
B. identity management
C. federated identity management
D. realm management


B. identity management

Computer Science & Information Technology

You might also like to view...

Which statement is false?

a. When a method call is made, the called method must know how to return to its caller, so the return address is pushed onto the program execution stack. b. Stacks support recursive method calls in the same manner as conventional, nonrecursive method calls. c. The program execution stack contains the space created for a method's global variables on each invocation of that method during a program's execution. d. When a method returns to its caller, the memory for that method's local variables is popped off the stack and those variables are no longer known to the program.

Computer Science & Information Technology

Importing data into a Project 2010 file means to convert it from a non-Project 2010 file format into a Project 2010 file format.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is an identification code that consists of a set of vertical lines and spaces of different widths?

A. RFID B. OCR C. bar code D. turnaround

Computer Science & Information Technology

Which type of loop is guaranteed to execute its body at least once?

a) do-while b) for c) switch d) while

Computer Science & Information Technology