Multiple Choice
__________ is verification that the credentials of a user or other system entity are valid.
A) Adequacy
B) Authentication
C) Authorization
D) Audit
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q8: _ access control controls access based on
Q9: An independent review and examination of system
Q10: An ABAC model can define authorizations that
Q11: _ is based on the roles the
Q12: _ controls access based on comparing security
Q14: A _ is a mapping between a
Q15: A constraint is a defined relationship among
Q16: Any program that is owned by, and
Q17: A concept that evolved out of requirements
Q18: The principal objectives of computer security are