In what part of the process to grant access to a system does the user present a token?

In what part of the process to grant access to a system does the user present a token?
A . Authorisation
B . Verification
C . Authentication
D . Identification

Answer: D

Explanation:

In what part of the process to grant access to a system does the user present a token? The user presents a token in the identification part of the process. Identification is the process of claiming an identity or presenting an identifier to a system. An identifier is a unique name or label that represents a person or entity. A token is a physical device or object that contains or generates an identifier, such as a smart card, a key fob, or a QR code. Identification is used to initiate the access request and associate it with an identity. Identification is followed by authentication, which verifies the identity claim, and authorization, which determines the level of access granted. ISO/IEC 27001:2022 defines identification as “recognition of an entity by an identifier in a particular context” (see clause 3.29).

Reference: [CQI & IRCA Certified ISO/IEC 27001:2022 Lead Auditor Training Course], ISO/IEC 27001:2022 Information technology ― Security techniques ― Information security management systems ― Requirements, [What is Identification?]

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments