Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1 ) biometrics 2 ) DAC 3 ) Least privilege model 4 ) MAC 5 ) Multifactor authentication 6 ) OTP 7 ) Role based

1) biometrics
2) DAC
3) Least privilege model
4) MAC
5) Multifactor authentication
6) OTP
7) Role based access
8) Rule based access
9) Single factor
authentication
10) Software token
a) Defined by an admin based on the needs of the overall system
b) Allows users to determine who can have access to resources
c) App that generates one time password
d) Nondiscretionary control
e) A user provides one form of identification
f) A user must provide more than one form of identification
g) One time password
h) User only have enough access to what is needed to perform job-related
tasks
i) Users have no option to make changes on how a file or folder can be
accessed
j) Use of a body part to determine the users identity

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions