a. Distinguish between authentication and authorizations. 7a1.) A user is allowed to edit files in a particular

Question:

a. Distinguish between authentication and authorizations.

7a1.) A user is allowed to edit files in a particular directory. This is an example of ________. (Select the most specific answer.)

a. Authentication

b. Authorizations

c. Defense in depth

d. Network segregation


7a2.) If someone has been properly authenticated, they should receive ________ permissions.

a. All

b. No

c. Maximum

d. Minimum


7a3.) Actions that people are allowed to take on a resource come under the heading of ________ . (Select the most specific answer.)

a. Provisions

b. Authorizations

c. Authentications

d. Risks


b. What is another term for authorizations?

7b.) Another term for authorization is ________ .

a. Permission

b. Authentication

c. Scope

d. Establishing the creator of a file


c. What is the principle of least permissions?

7c.) On sensitive resources, authenticated parties should get ________ .

a. Least permissions

b. Standard permissions

c. No permissions

d. Maximum permissions


d. Why is it important?

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Business Data Networks and Security

ISBN: 978-0134817125

11th Edition

Authors: Raymond R. Panko, Julia L. Panko

Question Posted: