What is invoked when a person claims they are the user but cannot be authenticated—such as when they lose their password?
a. Identity proofing
b. Social engineering
c. Directory traversal
d. Cross-site requesting
Answer: A
Identity proofing is invoked when a person claims they are the user but cannot be authenticated, such as when they lose their password.