Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
For a system being accessed, when employees share user IDs / passwords, this represents an absence of proper:
Authorization.
Availability.
Accountability.
Authentication.
The absence of a unique UserID and Password is accountability. Shared login credentials do not allow for accountability, therefore it is absent.
A. Shared login credentials do not allow for accountability. Accountability is the ability to map a given activity or event back to the responsible party. B. Availability, as it relates to information security, is the concept that systems and data are available when needed. Availability is not affected by shared login credentials. C. Authentication is the act of verifying the identity of a user, system or service for the purpose of determining their eligibility to access computerized information. D. Authorization addresses approval of system access.
The purpose of a username and password are to authenticate who the individual accessing the system. Confusing question.
**[edit] I agree, if a user log in the system with userid and pwd of another user, first of all is a matter of authentication. Only as a consequence, the lack of authentication leads to absence of accountability [edit]
[edit] the explanation shows the answer is accountability. but authentication is marked as the right answer. when more than one person uses the same credentials - accountability is under question I believe.
[edit] this question should have either accountability or authentication. Both are correct and the question isn’t written such that suggests that there’s a best answer. There is a definitive absence of both.
VERY MISLEADING QUESTION!
[edit] I think the current answer (authentication and accountability) is wrong. Users are able to authenticate but you can't account for who performed the action. For instance, sharing admin credentials does not affect authentication for the user but it impacts accountability. In other words, users can prove their right to access the system with a shared credentials but actions cannot be correlated to the individual.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.