Live Virtual Machine Lab 12.2: Module 12 Authentication and Authorization Solutions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

How many entities are involved in the 802.1x authentication process?

3

Which of the following protocol uses port-based authentication?

802.1X

Which of the following authentication method can use location to authenticate a user?

Attribute-based Access Control (ABAC)

Which of the following functions can be performed by a hardware security module (HSM)? [Choose all that apply]

Encryption Keys Management Key Exchange Encryption and Decryption Cryptographic function offloading from a server

Which of the following is required for two-factor authentication? [Choose all that apply]

Password key Password Smart card


संबंधित स्टडी सेट्स

Microeconomics - Chapter 7 Other definitions

View Set

Chapter 7: The Reconstructive Nature of Memory: Cognitive Psychology In and Out of the Laboratoruy

View Set