Multiple Choice
Hardware or software tokens are used for
A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The minute differences in physical traits used to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
Correct Answer:

Verified
Correct Answer:
Verified
Q15: OpenID uses an<br>A) Insecure model of authentication<br>B)
Q16: The access registry<br>A) Is the set of
Q17: Single sign-on technologies<br>A) Ensure that the user
Q18: Identity management involves<br>A) Identifying individuals and collecting
Q19: OAuth allows users to<br>A) Grant access to
Q20: A system of record is<br>A) Provides security
Q21: Identity reconciliation involves<br>A) Locating all new and
Q23: An individual's affiliation with the organization is
Q24: Identity discovery involves<br>A) Locating all new and
Q25: Match/ merge is an industry term for<br>A)