What is invoked when a person claims they are the user but cannot be authenticated—such as when they lose their password?

What is invoked when a person claims they are the user but cannot be authenticated—such as when they lose their password?




a. Identity proofing
b. Social engineering
c. Directory traversal
d. Cross-site requesting


Answer: A


Identity proofing is invoked when a person claims they are the user but cannot be authenticated, such as when they lose their password.


Learn More :

Access Control and Identity Management

Learn More Multiple Choice Question :