Multiple Choice
Access controls consist of ____, which confirms user identity, and ____, which determines user access levels.
A) access, privileges
B) authorization, privileges
C) authentication, authorization
D) passwords, privileges
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: Backup and recovery procedures are recommended only
Q2: Making and distributing information goods to which
Q3: Which of the following can be classified
Q4: Implementing controls to prevent threats from occurring
Q5: Whereas phishing attacks are _ , denial
Q6: An information system's _ is the likelihood
Q7: _ can be used to create strong
Q8: Computer programs like CAPTCHA are used to
Q9: An unintentional attack in which the perpetrator
Q10: Buying health insurance is an example of