New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

WGU (QGC2) Information Technology Management Exam - Topic 1 Question 1 Discussion

Actual exam question for WGU's WGU (QGC2) Information Technology Management exam
Question #: 1
Topic #: 1
[All WGU (QGC2) Information Technology Management Questions]

What is a method for confirming users' identities?

Show Suggested Answer Hide Answer
Suggested Answer: C

Defining Authentication:

Authentication is the process of verifying a user's identity to ensure they are who they claim to be.

This is commonly achieved through knowledge factors (passwords), possession factors (tokens), or biometric factors (fingerprints).

Why Other Options Are Incorrect:

Option A (Information secrecy): Focuses on protecting data, not identity confirmation.

Option B (Public key encryption): A method of encryption, not directly tied to user identity verification.

Option D (Authorization): Deals with granting access to resources after authentication.

:

'Authentication and Identity Management' -- NIST

Authentication Processes Overview -- ISO 27001


Contribute your Thoughts:

0/2000 characters
Maryln
9 hours ago
I thought A) Information secrecy was more about keeping data safe, not confirming identities.
upvoted 0 times
...
Delisa
6 days ago
Totally agree with C! It's all about verifying who you are.
upvoted 0 times
...
Martha
11 days ago
Wait, isn't B) Public key encryption also a form of identity confirmation?
upvoted 0 times
...
Benedict
16 days ago
I tried using "password123" for authentication, but the system kept saying it was "not secure enough." Guess I'll have to try "password1234" next.
upvoted 0 times
...
Dolores
21 days ago
C) Authentication is the way to go. Public key encryption is more about securing data, not confirming identities.
upvoted 0 times
...
Kayleigh
26 days ago
I always get authentication and authorization mixed up. Maybe I should just use my dog's name as my password - that's pretty secure, right?
upvoted 0 times
...
Lezlie
1 month ago
I feel like I’ve seen a question like this before, and I think authentication was definitely the focus.
upvoted 0 times
...
Phung
1 month ago
I remember studying about public key encryption, but that seems more related to securing data rather than confirming identities.
upvoted 0 times
...
Catrice
1 month ago
I think authentication is the right answer, but I’m not entirely sure if it’s the only method.
upvoted 0 times
...
Odette
2 months ago
I'm pretty sure the answer is C) Authentication. That's the standard method for verifying a user's identity, like through passwords, biometrics, or other credentials. The other options are more about securing information or controlling access, not identity confirmation.
upvoted 0 times
...
Felton
2 months ago
I'm a little confused on the difference between authentication and authorization. I know they're both important security concepts, but I'm not sure which one is specifically about confirming identity. I'll have to think this one through carefully.
upvoted 0 times
...
Stephen
2 months ago
Okay, let me think this through. Authentication seems like the most direct way to confirm a user's identity, so that's probably the right answer. The other options don't seem as directly related to identity verification.
upvoted 0 times
...
Galen
2 months ago
C) Authentication is the way to go!
upvoted 0 times
...
Zoila
2 months ago
C) Authentication is the correct answer. It's the process of verifying a user's identity.
upvoted 0 times
...
Vilma
3 months ago
Authorization sounds familiar too, but I believe it’s more about permissions rather than verifying who someone is.
upvoted 0 times
...
Howard
3 months ago
I'm pretty sure option D) Authorization is about controlling access, not verifying who you are. This exam is tripping me up!
upvoted 0 times
...
Laura
3 months ago
Hmm, I'm not totally sure about this one. I know authentication has something to do with verifying identity, but I'm not confident that's the only method. Maybe public key encryption could also be used?
upvoted 0 times
...
Kathrine
3 months ago
I think the answer is C) Authentication. That's the main way to confirm a user's identity, right?
upvoted 0 times
Melynda
2 months ago
I agree, C) Authentication is key.
upvoted 0 times
...
...

Save Cancel