Multiple Choice
The access control whereby users verify their right to access by providing something they have or something they are is referred to as:
A) user authorization.
B) user identification.
C) user profiles.
D) user authentication.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q31: User authorization makes use of access control
Q32: The newer title for the information security
Q33: A _ is a complete computing facility
Q34: The Certified Information Security Manager designation is
Q35: _gathers data from the user's machine.
Q37: An _ is a set of four
Q38: Information security management is the activity of
Q39: When backup service includes a hot site,
Q40: Authorization makes use of_ that specify the
Q41: Which of the following is not part