Verification that the users claimed identity is valid is a form of:
A.
Authentication
B.
Identification
C.
Integrity
D.
Confidentiality
Explanation:
Authentication is verification that the users claimed identity is
valid. Identification describes a method of ensuring that a subject (user, program,
or process) is the entity it claims to be. Identification can be provided with the
use of a username or account number. To be properly authenticated, the subject is
usually required to provide a second piece to the credential set. This piece could
be a password, passphrase, cryptographic key, personal identification number (PIN),
anatomical attribute, or token. These two credential items are compared to
information that has been previously stored for this subject. If these credentials
match the stored information, the subject is authenticated.