Which of the following access control processes confirms the identity of the entity seeking access to a logical or physical area?

A. identification
B. authentication
C. authorization
D. accountability


Answer: B

Computer Science & Information Technology

You might also like to view...

____ itemizes and describes all foreseeable contingencies that might impact the organization.

A. Enterprise planning B. Continuity planning C. Strategic planning D. Disaster planning

Computer Science & Information Technology

This is an example of which of the following topologies?

What will be an ideal response?

Computer Science & Information Technology

The [Ctrl]+[I] keyboard shortcut applies ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is the path to the ‘What-If Analysis' button?

A. (DATA tab | Calculation Tools group) B. (DATA tab | Formula Tools group) C. (DATA tab | Forecast group) D. (DATA tab | Problem Solving Tools group)

Computer Science & Information Technology