New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

ISO-IEC-LI Questions and Answers

Question # 6

Logging in to a computer system is an access-granting process consisting of three steps: identification, authentication and authorization. What occurs during the first step of this process: identification?

A.

The first step consists of checking if the user is using the correct certificate.

B.

The first step consists of checking if the user appears on the list of authorized users.

C.

The first step consists of comparing the password with the registered password.

D.

The first step consists of granting access to the information to which the user is authorized.

Full Access
Question # 7

One of the ways Internet of Things (IoT) devices can communicate with each other (or ‘the outside world’) is using a so-called short-range radio protocol. Which kind of short-range radio protocol makes it possible to use your phone as a credit card?

A.

Near Field Communication (NFC)

B.

Bluetooth

C.

Radio Frequency Identification (RFID)

D.

The 4G protocol

Full Access