Live Virtual Machine Lab 12.2: Module 12 Authentication and Authorization Solutions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

How many entities are involved in the 802.1x authentication process?

3

Which of the following protocol uses port-based authentication?

802.1X

Which of the following authentication method can use location to authenticate a user?

Attribute-based Access Control (ABAC)

Which of the following functions can be performed by a hardware security module (HSM)?

Cryptographic function offloading from a server Encryption Keys Management Key Exchange Encryption and Decryption

Which of the following is required for two-factor authentication?

Password key Password Smart card


संबंधित स्टडी सेट्स

Ch.9 IT Sim: Security and Privacy

View Set

Scarcity and Choice: The basic economic problem

View Set

Split phase motors travys test 4

View Set