(ISC)2(ISC)2
CERTIFIED-IN-CYBERSECURITY · Question #570
CERTIFIED-IN-CYBERSECURITY Question #570: Real Exam Question with Answer & Explanation
The correct answer is D: To verify the identity of users. To verify the identity of users. Strong authentication methods, such as two-factor authentication or biometric authentication, are used to verify and validate the identity of users accessing systems or data.
Access Controls Concepts
Question
What is the purpose of strong authentication in information security?
Options
- ATo establish non-repudiation
- BTo guarantee availability
- CTo ensure confidentiality
- DTo verify the identity of users
Explanation
To verify the identity of users. Strong authentication methods, such as two-factor authentication or biometric authentication, are used to verify and validate the identity of users accessing systems or data.
Topics
#Authentication#Strong Authentication#Identity Verification#Access Control
Community Discussion
No community discussion yet for this question.