Which common attribute of all access controls is used to identify unique records in a set, such as a username?

A) Identification scheme
B) Authentication method
C) Authorization model
D) None of the above

A) Identification scheme

Computer Science & Information Technology

You might also like to view...

When using the Form Tool, a main form and subform will be created if ________ relationship exists

A) a one-to-one B) a many-to-many C) a one-to-many D) any

Computer Science & Information Technology

You are responsible for the design of a communications switch that has to provide 24/7 availability, but which is not safety-critical. Giving reasons for your answer, suggest an architectural style that might be used for this system.

What will be an ideal response?

Computer Science & Information Technology