Match each item with a statement below.
-Implemented at the discretion of the data user.
A) authentication
B) least privilege
C) discretionary access controls
D) authorization
E) separation of duties
F) identification
G) need to know
H) nondiscretionary access controls
I) accountability
Correct Answer:
Verified
Q32: Match each item with a statement below.
-Confirming
Q33: _ IP address mappings work best because
Q34: Match each item with a statement below.
-Obtaining
Q35: In _-based access controls, access is granted
Q36: Match each item with a statement below.
-Determining
Q38: You might have to use TACACS+ or
Q39: The _ authentication server is also known
Q40: Match each item with a statement below.
-This
Q41: What are the functions that can be
Q42: What is a disadvantage of centralized authentication?
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents