I'm leaning towards C) authentication. I mean, if you can't verify the identity of the entity trying to access the resource, how can you possibly authorize them to do anything?
You know, I was thinking the same thing as Jesusita. Maybe the answer is a combination of authorization and accountability. You need both to really control and monitor access effectively.
Hmm, that's a good point, Jesusita. But I think accountability is more about the logging and auditing side of things, whereas the question is specifically asking about what determines access. So I still think B) authorization is the best answer.
I'm not so sure. Couldn't you argue that accountability (answer D) is also important? I mean, even if you have authorization, there needs to be a way to track and log who is accessing what, right?
I agree with Lashonda. Authorization is the key here. Authentication (answer C) is about verifying the identity of the entity trying to access the resource, but authorization is what actually governs what they can do.
This is a great question! It really gets to the heart of access control and security. I think the answer is B) authorization. Authorization is the process of determining what a user, device, or application is allowed to do based on their identity and privileges.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Layla
6 months agoCora
6 months agoCarey
7 months agoLayla
7 months agoGlendora
7 months agoBarrett
7 months agoDick
7 months agoTerrilyn
7 months agoBarrett
7 months agoJohnna
8 months agoJessenia
8 months agoHailey
8 months agoGeorgene
6 months agoGrover
6 months agoAdelle
7 months agoGeorgene
7 months agoJesusita
8 months agoTennie
8 months agoLashonda
8 months ago