Live Virtual Machine Lab 12.2: Module 12 Authentication and Authorization Solutions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How many entities are involved in the 802.1x authentication process?

3

Which of the following protocol uses port-based authentication?

802.1X

Which of the following authentication method can use location to authenticate a user?

Attribute-based Access Control (ABAC)

Which of the following functions can be performed by a hardware security module (HSM)? [Choose all that apply]

Encryption Keys Management Key Exchange Encryption and Decryption Cryptographic function offloading from a server

Which of the following is required for two-factor authentication? [Choose all that apply]

Password key Password Smart card


Set pelajaran terkait

Microeconomics - Chapter 7 Other definitions

View Set

Chapter 7: The Reconstructive Nature of Memory: Cognitive Psychology In and Out of the Laboratoruy

View Set