Q: When implementing access control, which step should be taken first?
-
A
Encryption
-
B
Identification
-
C
Authentication
-
D
Authorization
B
Answer:
B
Explanation:
The first step in implementing access control is identification. Identification involves recognizing the user or entity attempting to access the system by gathering unique identifiers, such as a username or ID number. This step is crucial because it establishes who is requesting access, before any further verification or authorization occurs. After identification, the next step is authentication, where the system verifies the claimed identity, typically through credentials like passwords, biometric data, or other factors. Only after successful authentication can the system proceed to authorization, which determines what resources or actions the authenticated user is allowed to access or perform. Encryption, while important for securing data, is not the first step in access control.
Related Topic:
Share Above MCQ