Logging in to a computer system is an access-granting process consisting of three steps:
identification, authentication and authorization. What occurs during the first step of this process:
identification?

A.
The first step consists of checking if the user is using the correct certificate.
B.
The first step consists of checking if the user appears on the list of authorized users.
C.
The first step consists of comparing the password with the registered password.
D.
The first step consists of granting access to the information to which the user is authorized.
Explanation:
Granting access to authorized users involves a number of steps which include identification of the user, authentication of this user and authorizing the user to access an asset. Identification is the first step in the process to granting access. In identification a person presents a token, for example an account number or username. The system then needs to determine whether the token is authentic. To determine the authenticity of, for example, a username, the system checks if the username exists within the system. If the username exists the user is requested to give a password. The systems tests if the password is registered with the given username. If both these tests are valid, a user is authenticated. In this example, authenticating the username is based on its existence in the system and a valid password. From this information it can be derived that a valid user is requesting access. Subsequently the system checks the resources to which access may be granted based on the permissions attached to authenticated user.