
Which of the following is a secret numeric password used for authentication?


If you have established proper authentication, authorization, and accounting, appropriate mechanisms of nonrepudiation should be in place, and no user should be able to deny the actions she has carried out while in your organization’s system.Ħ. What process prevents someone from denying that she accessed a resource?Įxplanation: Nonrepudiation prevents one party from denying the actions it has carried out. What is the process of keeping track of a user’s activity?Įxplanation: Accounting, also known as auditing, is the process of keeping track of a user’s activity while accessing network resources, including the amount of time spent in the network, the services accessed while there, and the amount of data transferred during each session.ĥ. Of course, before authorization is to occur, authentication must occur.Ĥ. What is the process of giving individual access to a system or resource?Įxplanation: Authorization is the process of giving individuals access to system objects based on their identities. After a user is authenticated, he can access network resources based on his authorization.ģ. What do you call the process in which a user is identified via a username and password?Įxplanation: Authentication is the process of identifying an individual, usually based on a username and password.

After a user is authenticated, she can access network resources based on her authorization.Ģ.

Here, authentication is the process of identifying an individual. Section Reference: Starting Security with AuthenticationĮxplanation: In the world of information security, AAA (authentication, authorization, and accounting) is a leading model for access control. What is the process of identifying an individual?
