New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM ISO27-13-001 Exam - Topic 6 Question 96 Discussion

Actual exam question for GAQM's ISO27-13-001 exam
Question #: 96
Topic #: 6
[All ISO27-13-001 Questions]

In what part of the process to grant access to a system does the user present a token?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Francoise
2 months ago
Wait, are we sure about that? Sounds off.
upvoted 0 times
...
Verdell
2 months ago
I agree, Authentication is the right answer.
upvoted 0 times
...
Clarence
3 months ago
I thought it was Verification?
upvoted 0 times
...
Irene
3 months ago
No way, it's Identification!
upvoted 0 times
...
Myra
3 months ago
It's definitely during Authentication.
upvoted 0 times
...
Kristel
3 months ago
I’m a bit confused; I thought identification was when you present something, but I guess that’s not the same as a token, right?
upvoted 0 times
...
Rasheeda
4 months ago
If I recall correctly, the token is definitely part of the authentication process. It’s when the system verifies who you are.
upvoted 0 times
...
Mollie
4 months ago
I remember practicing a question similar to this, and I believe it was about how tokens are used for verification, but that feels off now.
upvoted 0 times
...
Lacresha
4 months ago
I think the user presents a token during the authentication phase, but I'm not entirely sure.
upvoted 0 times
...
Melynda
4 months ago
Authentication seems like the most logical choice here. The user needs to authenticate their identity before being granted access.
upvoted 0 times
...
Ora
4 months ago
The question is asking about granting access, so I think the token is presented during the authorization step. I'll go with option A.
upvoted 0 times
...
Elly
5 months ago
Hmm, I'm a bit unsure about this one. I'll have to think it through carefully before selecting an answer.
upvoted 0 times
...
Bambi
5 months ago
I'm pretty sure the user presents a token during the authentication process, so I'll go with option C.
upvoted 0 times
...
Carla
8 months ago
Ha, this question is a real token-tester! I'm going with C) Authentication, the classic 'show me your papers' step.
upvoted 0 times
...
Veta
8 months ago
Hmm, I'm not sure. Could it be B) Verification? Isn't that when the system checks if the token is valid?
upvoted 0 times
Onita
7 months ago
Cristal: And after authentication and verification, the user is granted access to the system.
upvoted 0 times
...
Almeta
7 months ago
User 3: Yes, that's correct. Verification is the process of confirming the validity of the token.
upvoted 0 times
...
Cristal
7 months ago
User 2: Oh, I see. So, B) Verification is when the system checks if the token is valid?
upvoted 0 times
...
Aracelis
8 months ago
User 1: It's actually C) Authentication. That's when the user presents the token to prove their identity.
upvoted 0 times
...
...
Elli
9 months ago
Actually, the user presents a token during authorisation to gain access.
upvoted 0 times
...
Rebbecca
9 months ago
Gotta be C) Authentication. That's the part where the user shows their credentials to access the system, right?
upvoted 0 times
Elli
7 months ago
Authentication is crucial for ensuring only authorized users can access the system.
upvoted 0 times
...
Doug
7 months ago
That's right. It's the step where the system confirms the user's identity before granting access.
upvoted 0 times
...
Glenna
8 months ago
Yes, you're correct. Authentication is when the user presents their credentials to verify their identity.
upvoted 0 times
...
...
Larue
9 months ago
I believe the user presents a token during verification.
upvoted 0 times
...
Avery
9 months ago
Definitely C) Authentication. That's the step where the user proves they are who they say they are, usually with a token or password.
upvoted 0 times
...
Sherill
9 months ago
I think the answer is C) Authentication. That's where the user presents their credentials, like a token, to verify their identity.
upvoted 0 times
Elena
8 months ago
Yes, that's correct. It's part of verifying the user's identity.
upvoted 0 times
...
Venita
9 months ago
I agree, the user presents a token during the authentication process.
upvoted 0 times
...
...
Kanisha
9 months ago
I agree with Freeman, it makes sense to present a token during authentication.
upvoted 0 times
...
Freeman
10 months ago
I think the user presents a token during authentication.
upvoted 0 times
...

Save Cancel