Matching
Match each term with the correct statement below.
Premises:
A database stored on the network itself that contains information about users and network devices
The right given to access
Validating credentials as genuine
Granting permission to take an action
A specific resource, such as a file or a hardware device
A review of credentials
Individual to whom day-to-day actions have been assigned
User who accesses information in the course of routine job responsibilities
Responses:
Access
End user
Authorization
Authentication
Identification
Custodian
Object
Directory service
Owner
Correct Answer:
Premises:
Responses:
Access
End user
Authorization
Authentication
Identification
Custodian
Object
Directory service
Owner
Premises:
Access
End user
Authorization
Authentication
Identification
Custodian
Object
Directory service
Owner
Responses:
Related Questions
Q27: In the DAC model, _ can create
Q32: The X.500 standard defines a protocol for
Q33: Entries in the DIB are arranged in
Q35: The capability to look up information by
Q35: Often _ results from a single user
Q36: _ attacks may allow an attacker to
Q41: Describe the MAC lattice model.
Q43: Discuss the two significant weaknesses of DAC.
Q45: Describe LDAP injection attacks.
Q50: Discuss the differences between DAP and LDAP.
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents