Briefly describe the purposes of the user authentication procedure during incident management.

What will be an ideal response?

Determine if the help desk is authorized to handle the request for support services
Get billing information (if necessary) from the user

Computer Science & Information Technology

You might also like to view...

In B2B commerce, businesses buy and sell goods and services with ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Red Hat, iOS, Windows 10, and OS X are all examples of

A) Shareware B) Firmware C) Hardware D) Operating systems

Computer Science & Information Technology