Which of the following is an example of the implementation of - ProProfs Discuss
Topics-
Products +
     

Which of the following is an example of the implementation of identification?



A. A new employee is given a unique identifier to log on to a system
B. An administrator uses system records to identify suspicious activity
C. A manager is granted permission to access a resource
D. The identifier a user enters is compared to identifiers stored on the system

This question is part of Security + Test
Asked by Tiny shogun, Last updated: Sep 14, 2018

+ AnswerRequest Answer
...

2 Answers

F. Ray

F. RayStudent, Kansas City
Student, Kansas City

Answered on Sep 14, 2018

In every company security is vital and with everything now on file in computer systems, data control is paramount. Whether a certain individual can access one part or all of the data s/he seeks comes down to control of identity. Lanyards are the norm in even small organisations for access to the building itself, but in the IT system that holds all the company data, it is essential to develop identification implementation strategies.

Increasingly there is sophisticated software produced for companies to use for this, using such concepts as privacy-preserving, minimal disclosure, zero-knowledge proofs, and so on. In sales environments, a MyDomain may suffice to allow salesforce to access full entry, with a different sub-domain, clients may access the website main features. Any strategy for ensuring identity is what it seems, is an implementation.

 Reply

tiny shogun

Tiny shogun

Answered on Mar 07, 2018

A new employee is given a unique identifier to log on to a system
 Reply

Search for Google images
Select a recommended image
Upload from your computer
Search for Google images
Select a recommended image
Upload from your computer
Search for Google images
Select a recommended image
Upload from your computer

Email Sent
We have sent an email to your address "" with instructions to reset your password.