Live Virtual Machine Lab 12.2: Module 12 Authentication and Authorization Solutions
Réussis tes devoirs et examens dès maintenant avec Quizwiz!
How many entities are involved in the 802.1x authentication process?
3
Which of the following protocol uses port-based authentication?
802.1X
Which of the following authentication method can use location to authenticate a user?
Attribute-based Access Control (ABAC)
Which of the following functions can be performed by a hardware security module (HSM)?
Cryptographic function offloading from a server Encryption Keys Management Key Exchange Encryption and Decryption
Which of the following is required for two-factor authentication?
Password key Password Smart card