The process of verifying that a particular identity are permitted to do in a system?1.0 MarksAuthorizationAccountabilityAuthenticationAvailability
Question
The process of verifying that a particular identity are permitted to do in a system?
Authorization
Accountability
Authentication
Availability
Solution
The process of verifying that a particular identity is permitted to do something in a system is called Authorization.
Here are the steps involved in this process:
-
Identification: The first step is to identify the user who is trying to access the system. This is usually done through a username or ID.
-
Authentication: After the user is identified, the system needs to verify that the user is who they claim to be. This is usually done through a password or other form of authentication.
-
Authorization: Once the user is authenticated, the system checks what permissions the user has. This determines what the user is allowed to do within the system.
-
Access: After the user is authorized, they are granted access to the system and can perform the actions they are permitted to do.
So, the answer to your question is Authorization.
Similar Questions
The process of verifying that a particular identity are permitted to do in a system?1.0 MarksAuthorizationAccountabilityAuthenticationAvailability
Passwords are a form of:Group of answer choicesIdentificationAuthorisationVerificationAuthentication
Fill in the blank: The authentication server is to authentication as the ticket granting service is to _____.
_____ ensures that information can only be obtained by authorized users. A. Integrity B. Confidentiality C. Availability D. Controllability
Verification actions must do that will result in sufficient objective evidence to show that the entity has fulfilled the requirement(s).
Upgrade your grade with Knowee
Get personalized homework help. Review tough concepts in more detail, or go deeper into your topic by exploring other relevant questions.