Question: a. Distinguish between authentication and authorizations. 7a1.) A user is allowed to edit files in a particular directory. This is an example of ________. (Select

a. Distinguish between authentication and authorizations.

7a1.) A user is allowed to edit files in a particular directory. This is an example of ________. (Select the most specific answer.)

a. Authentication

b. Authorizations

c. Defense in depth

d. Network segregation


7a2.) If someone has been properly authenticated, they should receive ________ permissions.

a. All

b. No

c. Maximum

d. Minimum


7a3.) Actions that people are allowed to take on a resource come under the heading of ________ . (Select the most specific answer.)

a. Provisions

b. Authorizations

c. Authentications

d. Risks


b. What is another term for authorizations?

7b.) Another term for authorization is ________ .

a. Permission

b. Authentication

c. Scope

d. Establishing the creator of a file


c. What is the principle of least permissions?

7c.) On sensitive resources, authenticated parties should get ________ .

a. Least permissions

b. Standard permissions

c. No permissions

d. Maximum permissions


d. Why is it important?

Step by Step Solution

3.34 Rating (163 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a Authentication is the proof of identity If someone is authenticated author... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Business Data Networks Questions!