a. Distinguish between authentication and authorizations. 7a1.) A user is allowed to edit files in a particular
Question:
a. Distinguish between authentication and authorizations.
7a1.) A user is allowed to edit files in a particular directory. This is an example of ________. (Select the most specific answer.)
a. Authentication
b. Authorizations
c. Defense in depth
d. Network segregation
7a2.) If someone has been properly authenticated, they should receive ________ permissions.
a. All
b. No
c. Maximum
d. Minimum
7a3.) Actions that people are allowed to take on a resource come under the heading of ________ . (Select the most specific answer.)
a. Provisions
b. Authorizations
c. Authentications
d. Risks
b. What is another term for authorizations?
7b.) Another term for authorization is ________ .
a. Permission
b. Authentication
c. Scope
d. Establishing the creator of a file
c. What is the principle of least permissions?
7c.) On sensitive resources, authenticated parties should get ________ .
a. Least permissions
b. Standard permissions
c. No permissions
d. Maximum permissions
d. Why is it important?
Step by Step Answer:
Business Data Networks and Security
ISBN: 978-0134817125
11th Edition
Authors: Raymond R. Panko, Julia L. Panko