Live Virtual Machine Lab 12.2: Module 12 Authentication and Authorization Solutions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How many entities are involved in the 802.1x authentication process?

3

Which of the following protocol uses port-based authentication?

802.1X

Which of the following authentication method can use location to authenticate a user?

Attribute-based Access Control (ABAC)

Which of the following functions can be performed by a hardware security module (HSM)?

Cryptographic function offloading from a server Encryption Keys Management Key Exchange Encryption and Decryption

Which of the following is required for two-factor authentication?

Password key Password Smart card


Set pelajaran terkait

Ch.9 IT Sim: Security and Privacy

View Set

Scarcity and Choice: The basic economic problem

View Set

Split phase motors travys test 4

View Set