15. __________ is a centralized, automated approach to provide enterprise wide access to resources by employees and other authorized individuals, with a focus of defining an identity for each user,
associating attributes with the identity, and enforcing a means by which a user can verify identity. ?
A. Registration authority ? B. Federated managing authority
C. Identity management ? D. PKIX management
C
Business
You might also like to view...
Which of the following is used for formal classification of the various types of computers?
A) cost B) industry application C) storage capacity D) processing power E) artificial intelligence
Business
Intrinsic rights are to be respected because ________
a) they have moral standing independent of the consequences they yield b) they lead to desirable consequences c) they lead to the maximization of individual well-being d) they have legal standing and are codified by the state
Business