nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #570

CERTIFIED-IN-CYBERSECURITY Question #570: Real Exam Question with Answer & Explanation

The correct answer is D: To verify the identity of users. To verify the identity of users. Strong authentication methods, such as two-factor authentication or biometric authentication, are used to verify and validate the identity of users accessing systems or data.

Access Controls Concepts

Question

What is the purpose of strong authentication in information security?

Options

  • ATo establish non-repudiation
  • BTo guarantee availability
  • CTo ensure confidentiality
  • DTo verify the identity of users

Explanation

To verify the identity of users. Strong authentication methods, such as two-factor authentication or biometric authentication, are used to verify and validate the identity of users accessing systems or data.

Topics

#Authentication#Strong Authentication#Identity Verification#Access Control

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions