This topic contains a solution. Click here to go to the answer

Author Question: __________ is verification that the credentials of a user or other system entity are valid. A. ... (Read 20 times)

melina_rosy

  • Hero Member
  • *****
  • Posts: 531
__________ is verification that the credentials of a user or other system entity are valid.
 
  A. Adequacy B. Authentication
   C. Authorization D. Audit

Question 2

1. __________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.
 
  A. Audit control B. Resource control
  C. System control D. Access control



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

Madisongo23

  • Sr. Member
  • ****
  • Posts: 325
Answer to Question 1

B

Answer to Question 2

D




melina_rosy

  • Member
  • Posts: 531
Reply 2 on: Jul 7, 2018
YES! Correct, THANKS for helping me on my review


miss_1456@hotmail.com

  • Member
  • Posts: 289
Reply 3 on: Yesterday
Excellent

 

Did you know?

There are more sensory neurons in the tongue than in any other part of the body.

Did you know?

Computer programs are available that crosscheck a new drug's possible trade name with all other trade names currently available. These programs detect dangerous similarities between names and alert the manufacturer of the drug.

Did you know?

The first-known contraceptive was crocodile dung, used in Egypt in 2000 BC. Condoms were also reportedly used, made of animal bladders or intestines.

Did you know?

As of mid-2016, 18.2 million people were receiving advanced retroviral therapy (ART) worldwide. This represents between 43–50% of the 34–39.8 million people living with HIV.

Did you know?

Cyanide works by making the human body unable to use oxygen.

For a complete list of videos, visit our video library