Which of the following access control processes confirms the identity of the entity seeking access to a logical or physical area?
A. identification
B. authentication
C. authorization
D. accountability
Answer: B
Computer Science & Information Technology
You might also like to view...
____ itemizes and describes all foreseeable contingencies that might impact the organization.
A. Enterprise planning B. Continuity planning C. Strategic planning D. Disaster planning
Computer Science & Information Technology
This is an example of which of the following topologies?
What will be an ideal response?
Computer Science & Information Technology
The [Ctrl]+[I] keyboard shortcut applies ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following is the path to the ‘What-If Analysis' button?
A. (DATA tab | Calculation Tools group) B. (DATA tab | Formula Tools group) C. (DATA tab | Forecast group) D. (DATA tab | Problem Solving Tools group)
Computer Science & Information Technology