CERTIFIED-IN-CYBERSECURITY · Question #542
CERTIFIED-IN-CYBERSECURITY Question #542: Real Exam Question with Answer & Explanation
The correct answer is C: Authentication. Authentication is the process of verifying or proving a user's identity (see the ISC2 Study Guide, Chapter 1, Module 1). Authentication typically involves the user providing credentials such as a username and password, a biometric scan, or a security token. For example, when you
Question
What is the term used to verify or prove the user's identity?
Options
- AValidation
- BAuthorization
- CAuthentication
- DVerification
Explanation
Authentication is the process of verifying or proving a user's identity (see the ISC2 Study Guide, Chapter 1, Module 1). Authentication typically involves the user providing credentials such as a username and password, a biometric scan, or a security token. For example, when you log in to your e-mail account, you authenticate your identity by providing your user name and password. The remaining options, while related, do not accurately describe the process of verifying a user's identity. Verification is a part of the authentication process where the system confirms that the credentials provided are correct. However, it does not encompass the entire authentication process. Authorization is a separate process that takes place after authentication. It involves determining what actions the authenticated user is allowed to perform within the system. Finally, validation generally refers to verifying that data, such as input to a form, meets certain criteria or standards. While it may be part of the authentication process, it does not define the process of verifying a user's identity
Topics
Community Discussion
No community discussion yet for this question.