Live Virtual Machine Lab 12.2: Module 12 Authentication and Authorization Solutions
अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!
How many entities are involved in the 802.1x authentication process?
3
Which of the following protocol uses port-based authentication?
802.1X
Which of the following authentication method can use location to authenticate a user?
Attribute-based Access Control (ABAC)
Which of the following functions can be performed by a hardware security module (HSM)? [Choose all that apply]
Encryption Keys Management Key Exchange Encryption and Decryption Cryptographic function offloading from a server
Which of the following is required for two-factor authentication? [Choose all that apply]
Password key Password Smart card