Multiple Choice
Requiring someone requesting to use a resource to prove his or her identity is ________.
A) confidentiality
B) authentication
C) authorization
D) both B and C
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q103: What type of attacker are most attackers
Q104: Which of the following is not one
Q105: Security is primarily a management issue.
Q106: The last stage in a hacking attack
Q107: Viruses propagate within a computer by infecting
Q109: Compromises also are called _.<br>A)breaches<br>B)incidents<br>C)both A and
Q110: The password 7u3aB& is adequately strong.
Q111: It is generally illegal to write malware.
Q112: Which of the following can be a
Q113: With complex passwords,adding a single character increases