Which of the following correctly describes a federated identity and its role within identity management processes?
Which of the following reduces help-desk call volume, but is also criticized for the ease with which a hacker could gain access to multiple resources if a password is compromised?