A system that restricts access to resources based on continuous verification is known as ________.
- Authentication
- Authorization
- Encryption
- Firewall
An "Authorization" system verifies access rights continuously to ensure that only authorized users can access resources, maintaining security.
Loading...
Related Quiz
- What does IAM stand for in the context of cloud security?
- Which migration strategy might lead to higher costs in the long run if the application isn't optimized post-migration to take advantage of cloud-native features?
- Cloud monitoring tools often provide ________ capabilities, which allow for the setting of specific conditions that, when met, trigger notifications or actions.
- An individual within the organization who poses a potential security risk, whether intentional or unintentional, is referred to as a(n) ________.
- In the context of cloud computing, middleware that facilitates seamless scalability and manages application deployments across multiple servers is known as: