____________________ is concerned with what an identity is allowed to do.
Fill in the blank(s) with the appropriate word(s).
Authorization
You might also like to view...
________ is a technology applied to digital media files such as music, eBooks, and videos to impose restrictions on the use of these files
Fill in the blank(s) with correct word
Java software is designed to run on any computer or computing device, regardless of the specific microprocessor or operating system it uses.
a. true b. false
A security technician would like to obscure sensitive data within a file so that it can be transferred without causing suspicion.Which of the following technologies would BEST be suited to accomplish this?
A. Transport Encryption B. Stream Encryption C. Digital Signature D. Steganography
________ is a process where authentication and permission will be passed on from one system to another, usually across multiple enterprises, reducing the number of authentications needed by the user.
A. Integration B. Registration C. Synchronization D. Federation