Live Virtual Machine Lab 12.2: Module 12 Authentication and Authorization Solutions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

How many entities are involved in the 802.1x authentication process?

3

Which of the following protocol uses port-based authentication?

802.1X

Which of the following authentication method can use location to authenticate a user?

Attribute-based Access Control (ABAC)

Which of the following functions can be performed by a hardware security module (HSM)? [Choose all that apply]

Encryption Keys Management Key Exchange Encryption and Decryption Cryptographic function offloading from a server

Which of the following is required for two-factor authentication? [Choose all that apply]

Password key Password Smart card


संबंधित स्टडी सेट्स

2-2-A ¡Qué imprevisto! (Los imagenes)

View Set

Life Insurance Policy Provisions, Options, and Riders

View Set

Ch 4_The Relational Model of Data

View Set

SIE practice quiz part 1 (sec 4-6)

View Set

Ap gov unit 2 part 1 multiple choice

View Set