Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Dell EMC Exam DEA-3TT2 Topic 10 Question 55 Discussion

Actual exam question for Dell EMC's DEA-3TT2 exam
Question #: 55
Topic #: 10
[All DEA-3TT2 Questions]

What determines if a user, device, application, or process is allowed to access a service or a resource?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Johnna
1 days ago
I'm leaning towards C) authentication. I mean, if you can't verify the identity of the entity trying to access the resource, how can you possibly authorize them to do anything?
upvoted 0 times
...
Jessenia
3 days ago
You know, I was thinking the same thing as Jesusita. Maybe the answer is a combination of authorization and accountability. You need both to really control and monitor access effectively.
upvoted 0 times
...
Hailey
4 days ago
Hmm, that's a good point, Jesusita. But I think accountability is more about the logging and auditing side of things, whereas the question is specifically asking about what determines access. So I still think B) authorization is the best answer.
upvoted 0 times
...
Jesusita
5 days ago
I'm not so sure. Couldn't you argue that accountability (answer D) is also important? I mean, even if you have authorization, there needs to be a way to track and log who is accessing what, right?
upvoted 0 times
...
Tennie
7 days ago
I agree with Lashonda. Authorization is the key here. Authentication (answer C) is about verifying the identity of the entity trying to access the resource, but authorization is what actually governs what they can do.
upvoted 0 times
...
Lashonda
9 days ago
This is a great question! It really gets to the heart of access control and security. I think the answer is B) authorization. Authorization is the process of determining what a user, device, or application is allowed to do based on their identity and privileges.
upvoted 0 times
...

Save Cancel