menu
Qammunity
Login
Register
My account
Edit my Profile
Private messages
My favorites
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Janet is identifying the set of privileges that should be assigned to a new employee in her organization. which phase of the access control process is she performing? identification authentication accountability
asked
Dec 19, 2018
186k
views
2
votes
Janet is identifying the set of privileges that should be assigned to a new employee in her organization. which phase of the access control process is she performing? identification authentication accountability authorization
Business
college
Emanuel Sanga
asked
by
Emanuel Sanga
7.4k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
3
votes
Identification. Privileges are the benefit granted to an employee based upon the position they were hired to fill. In this stage one is identifying the employees position, the role they will serve, and the privileges they are to receive.
Nir Pengas
answered
Dec 24, 2018
by
Nir Pengas
9.0k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Sep 12, 2021
133k
views
Janet is identifying the set of privileges that should be assigned to a new employee in her organization. Which phase of the access control process is she performing? A. Identification B. Authentication
MBulli
asked
Sep 12, 2021
by
MBulli
7.7k
points
Computers and Technology
high-school
1
answer
1
vote
133k
views
asked
Oct 22, 2024
76.2k
views
What does a system log that tracks user activities on the system provide? 1) authentication 2) accountability 3) authorization 4) identification
Andrej Debenjak
asked
Oct 22, 2024
by
Andrej Debenjak
8.3k
points
Computers and Technology
high-school
2
answers
3
votes
76.2k
views
asked
May 15, 2024
118k
views
Documenting the activities of computer users is used for the ____ element of access control. 1) identification 2) authentication 3) authorization 4) accountability
David Hodge
asked
May 15, 2024
by
David Hodge
7.8k
points
Computers and Technology
high-school
1
answer
1
vote
118k
views
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Other Questions
Who was Adam Smith ? Anybody?
In what way did the GI Bill contribute to the growth of professional and white-collar jobs ? A.by providing US laborers with new job-training programs B.by giving US veterans assistance to purchase a new
What is meant by data mining ?
What is the best way to describe a stock market?
You sell popcorn during your schools football games. Knowing that the people usually buy more when the price is lower, how would you price your popcorn after halftime?
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search Qammunity