I'm leaning towards C) authentication. I mean, if you can't verify the identity of the entity trying to access the resource, how can you possibly authorize them to do anything?
You know, I was thinking the same thing as Jesusita. Maybe the answer is a combination of authorization and accountability. You need both to really control and monitor access effectively.
Hmm, that's a good point, Jesusita. But I think accountability is more about the logging and auditing side of things, whereas the question is specifically asking about what determines access. So I still think B) authorization is the best answer.
I'm not so sure. Couldn't you argue that accountability (answer D) is also important? I mean, even if you have authorization, there needs to be a way to track and log who is accessing what, right?
I agree with Lashonda. Authorization is the key here. Authentication (answer C) is about verifying the identity of the entity trying to access the resource, but authorization is what actually governs what they can do.
This is a great question! It really gets to the heart of access control and security. I think the answer is B) authorization. Authorization is the process of determining what a user, device, or application is allowed to do based on their identity and privileges.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Layla
9 months agoCora
9 months agoCarey
9 months agoLayla
9 months agoGlendora
10 months agoBarrett
10 months agoDick
10 months agoTerrilyn
10 months agoBarrett
10 months agoJohnna
11 months agoJessenia
11 months agoHailey
11 months agoGeorgene
9 months agoGrover
9 months agoAdelle
9 months agoGeorgene
10 months agoJesusita
11 months agoTennie
11 months agoLashonda
11 months ago