________ is the centralized policy-based management of all information required for access to corporate systems by people, machines, programs, or other resources.

A. Meta-identity management
B. Directory service
C. Meta-directory service
D. Identity management


D. Identity management

Computer Science & Information Technology

You might also like to view...

The linear search algorithm runs in ________time.

a. quadratic b. O(n) c. constant d. nonlinear

Computer Science & Information Technology

A subclass can override public methods of a superclass.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You cannot hide column A or row 1 because they cannot be unhidden

Indicate whether the statement is true or false

Computer Science & Information Technology

Which two elements can only exist in support of or as an enhancement to the other elements?

What will be an ideal response?

Computer Science & Information Technology