1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
3 years ago
13

What process identifies and grants access to a user who is trying to access a system? A. Credibility

Computers and Technology
1 answer:
xeze [42]3 years ago
8 0

Answer:

Option C is the correct answer for the above question

Explanation:

Authentication is used to grant a person to use the system so that no other person can hack the data of the system. It is done by some unique id which is provided to the user of that system. When any person wants to use the system he needs to use that a unique id and sometimes password and some other information to use the system.

The above question asked about the process through which the user of the system grants access to use the system only. So the process is Authentication. hence Option C is correct because it states about the process Authentication while the other is not because--

  • Option a states Credibility which is not the process to enter the system.
  • Option b states Authorization which is used if the system gives access to the user, not the user can take on its own.
  • Option d states Honesty which is not the process to enter the system.
You might be interested in
Research the design basis threat (DBT) in terms of Cybersecurity for an organization of your choice. Discuss what the Cybersecur
tiny-mole [99]

A Design Basis Threat (DBT) is known to be a characteristics of any given or potential insider and also those of external adversaries, that may try to have or gain unauthorized removal or sabotage, against a physical protection system that was set up designed and evaluated.

<h3>What are Cybersecurity objectives?</h3>

Cybersecurity aims are:

  • To protect computer system,
  • To protect networks,
  • To protect software programs from such cyber attacks.

Note that a lot of digital attacks are targeted at accessing, changing, or deleting sensitive information as well as others.

Learn more about IT from

brainly.com/question/1276995

#SPJ1

3 0
1 year ago
Floating point numbers?
blondinia [14]

Answer:

Thank you so much!!!

God bless you!!!

You the best!!!

Explanation:

4 0
3 years ago
What is the primary limitation of free versions of antivirus applications
ddd [48]

Answer:

Please look below for the answer

Explanation:

The primary limitation is that they don’t protect in real time. They also only perform quick scans which is not that efficient. They cannot scan the Windows directory. They only install on 64-bit operating systems

Hope I helped pls mark as brainliest

3 0
3 years ago
If you're working in a table that has three columns and five rows . the first row is the header row i want it to span all three
Ivenika [448]
Select the columns and merge.
3 0
3 years ago
Which of the following is a basic strategy for minimizing the opportunity for error in a process?
dolphi86 [110]

Answer: b) Standardizing how the process is completed

Explanation:

Occurrence of error in a process can be due to several reason like human error,equipmental error, qualitative error etc.It includes internal as well as external factor.To eliminate the occurrence of fault in process, it is better to follow standard and systematic working in uniform way so that any kind of manipulation and modification does not lead to error.

  • Other options are not appropriate because trying harder will not correct chances of fault rather it will only waste the efforts.Not depending on technology is also not the solution to gain accuracy in process.
  • Thus, the correct option is option(b).
6 0
3 years ago
Other questions:
  • Privileged instructions 1) generate an interrupt so they can execute before non-privileged instructions. 2) are valid only when
    5·1 answer
  • Write a program for Horizon Phones, a provider of cellular phone service. Prompt a user for maximum monthly values for talk minu
    6·1 answer
  • What type of file can most software applications read?
    5·2 answers
  • Fact Pattern: A sales transaction record designed to contain the information presented below. Column Information 1-10 Customer a
    13·1 answer
  • 2. What is a cap? (0.5 points)
    9·1 answer
  • You are planning to install Windows 10 on a computer in a dual-boot configuration. The computer already has Windows 8 installed.
    14·2 answers
  • Which of these personal protective equipment items prevents injury from falling objects ?
    15·1 answer
  • Hy plzz help me friends​
    5·2 answers
  • Which of the following is the best description of an ip address?
    8·1 answer
  • Write any four causes of cyber crime
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!