Multiple Choice
Requiring someone requesting to use a resource to prove his or her identity is ________.
A) confidentiality
B) authentication
C) integrity
D) authorization
E) Both b.and d.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q31: After a break-in,the first step usually is
Q36: Which type of attack is made by
Q37: A program that can capture passwords as
Q38: Security is primarily a _ issue.<br>A)management<br>B)technology
Q39: Which of the following attach themselves to
Q40: An action that will stop many viruses
Q42: Egress filtering examines packets _.<br>A)arriving from the
Q43: Attack programs that can be remotely controlled
Q44: A firewall drops a packet if it
Q45: ACLs are used for packets in the