AAA
A fingerprint, face scan or retina scan is considered what?
2 factor authentication
How we access and get access to computer resources is what?
AAA
A rogue administrator is considered: Authentication, Authorization, Accounting?
Accounting
Figuring out if there was a breach is: Authentication, Authorization, Accounting?
Accounting
Logs successful and unsuccessful connection attempts: Authentication, Authorization, Accounting?
Accounting
Provides forensic trail after a security breach: Authentication, Authorization, Accounting?
Accounting
Reports on user's access: Authentication, Authorization, Accounting?
Accounting
Verifying that the rules created, are enforced is: Authentication, Authorization, Accounting?
Accounting
When it happened, how it happened is: Authentication, Authorization, Accounting?
Accounting
___ helps harden our defenses and prevent similar future attacks
Accounting
Confirms user is who they claim to be: Authentication, Authorization, Accounting?
Authentication
Name and password login is: Authentication, Authorization, Accounting?
Authentication
Providing identity is: Authentication, Authorization, Accounting?
Authentication
Public Key Infrastructure (PKI): Authentication, Authorization, Accounting?
Authentication
Usernames and passwords: Authentication, Authorization, Accounting?
Authentication
What does AAA stand for?
Authentication Authorization Accounting
Being able to open, delete, change or print a document is: Authentication, Authorization, Accounting?
Authorization
Define what the user can access: Authentication, Authorization, Accounting?
Authorization
Gives permissions to a user: Authentication, Authorization, Accounting?
Authorization
What a user is allow to do is: Authentication, Authorization, Accounting?
Authorization
Write and delete, or read-only: Authentication, Authorization, Accounting?
Authorization
What does MFA stand for?
Multi-Factor Authentication