How is authentication performed using security principals?

What will be an ideal response?


Authentication is performed during logon when a user requests access to a system. The user provides credentials and the host system authenticates the identity of the user against an authentication database. A user in this context is also known as a security principal, someone who can request access to a resource. Security principals can be organized as single users or as groups.

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 1: MTN OutdoorYou have just started working for MTN Outdoor as a programmer. Your first assignment is to review and correct various code to use sub procedures and/or functions. Which of the following statements would invoke the GetEndInventory function and assign the function's return value to the intEnd variable?

A. Call GetEndInventory(intBegInv, intItemsSold, intReturned) B. intEnd = Call GetEndInventory(intBegInv, intItemsSold, intReturned) C. intEnd = GetEndInventory(intBegInv, intItemsSold, intReturned) D. intEnd = GetEndInventory()

Computer Science & Information Technology

It is the ability of a computer to perform ____ operations that separates it from other types of calculating devices.

A. arithmetic B. input C. logical D. output

Computer Science & Information Technology

Virtual machines cannot be run using actual disks, passed directly to the virtual machine

Indicate whether the statement is true or false

Computer Science & Information Technology

The ____________________ level of a message indicates to the recipient the priority level of an e-mail message.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology