The principal underlying standard for federated identity is the __________ which defines the exchange of security information between online business partners.

A. OSAIS
B. SAML
C. RBAC
D. SFIL


B. SAML

Computer Science & Information Technology

You might also like to view...

Which of the following terms is not used to refer to a sentinel value that breaks out of a while loop?

a. signal value. b. maximum value. c. dummy value. d. flag value.

Computer Science & Information Technology

If you enter a start date, the ____ automatically changes to match the start date.

A. to-do date B. task date C. end date D. due date

Computer Science & Information Technology

The most popular way for hackers to take over hosts today is ________.

A. by taking over an application B. by taking over the operating system C. by guessing the root password D. by taking over the user interface

Computer Science & Information Technology

Which of the following would be the best example of a post-test loop?

A. Print a number backward. B. Validate data read from the keyboard. C. Print a calendar. D. Print the sum of the digits in an integer.

Computer Science & Information Technology