Question: a. What is authentication? 19a.) Requiring someone prove his or her identity is _______. a. Confidentiality b. Authentication c. Authorization d. Both B and C

a. What is authentication?

19a.) Requiring someone prove his or her identity is _______.

a. Confidentiality

b. Authentication

c. Authorization

d. Both B and C


b. Distinguish between the supplicant and the verifier.

19b.) In authentication, the _______ is the party trying to prove his or her identity.

a. Supplicant

b. Verifier

c. True party

d. All of the above


c. What are credentials?

19c.) _______ is the general name for proofs of identity in authentication.

a. Credentials

b. Authorizations

c. Digital certificates

d. All of the above


d. Who is the true party?

19d.) The supplicant claims to be _______.

a. The true party

b. An impostor

c. Either A or B

d. Neither A nor B


e. What is the specific goal of authentication?


f. Is the supplicant the true party or is the supplicant an impostor?

19f.) The supplicant is _______.

a. The true party

b. An impostor

c. Either A or B

d. Neither A nor B


g. Why must authentication be appropriate for risks to an asset?

19g.) Authentication should generally be _______.

a. As strong as possible

b. Appropriate for a specific resource

c. The same for all resources

d. Different for every different resource

Step by Step Solution

3.50 Rating (167 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a In authentication a supplicant attempts to prove its identity to a verifier by sending credentials ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Business Data Networks Questions!