adplus-dvertising
frame-decoration

Question

The process of verifying the identity of a user.

a.

Authentication

b.

Identification

c.

Validation

d.

Verification

Answer: (a).Authentication

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The process of verifying the identity of a user.

Similar Questions

Discover Related MCQs

Q. A concern of authentication that deals with user rights.

Q. CHAP stands for?

Q. Security features that control that can access resources in the OS.

Q. An algorithm in encryption is called _____________

Q. The information that gets transformed in encryption is ____________

Q. If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________

Q. An attack on a website that stores and displays text to a user is known as ______ attack

Q. The URL of the page that had the link that the user clicked to access the page is called as _____

Q. State true or false: Password leakage is a major security problem

Q. The system where two independent pieces of data are used to identify a user is called as ______

Q. What are man in the middle attacks?

Q. What are phishing attacks?

Q. What is the standard for exchanging authentication and authorization information between two different security domains?

Q. A log of all changes to the application data is called as __________

Q. Which of the following is a valid encryption technique?

Q. In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.

Q. A Web site that allows users to enter text, such as a comment or a name, and then stores it and later displays it to other users, is potentially vulnerable to a kind of attack called a ___________________ attack.

Q. _________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

Q. Many applications use _________________, where two independent factors are used to identify a user.

Q. Even with two-factor authentication, users may still be vulnerable to_____________attacks.