Which of the following would accomplish this?
A company wants to ensure that all credentials for various systems are saved within a central
database so that users only have to login once for access to all systems. Which of the following
would accomplish this?
which of the following?
A user attempting to log on to a workstation for the first time is prompted for the following
information before being granted access: username, password, and a four-digit security pin that
was mailed to him during account registration. This is an example of which of the following?
which of the following?
A user attempting to log on to a workstation for the first time is prompted for the following
information before being granted access: username, password, and a four-digit security pin that
was mailed to him during account registration. This is an example of which of the following?
Which of the following allows a network administrator to implement an access control policy based on individua
Which of the following allows a network administrator to implement an access control policy based
on individual user characteristics and NOT on job function?
Which of the following allows a network administrator to implement an access control policy based on individua
Which of the following allows a network administrator to implement an access control policy based
on individual user characteristics and NOT on job function?
Which of the following is best practice to put at the end of an ACL?
Which of the following is best practice to put at the end of an ACL?
Which of the following is best practice to put at the end of an ACL?
Which of the following is best practice to put at the end of an ACL?
Which of the following is blocking network printing?
Users report that they are unable to access network printing services. The security technician
checks the router access list and sees that web, email, and secure shell are allowed. Which of the
following is blocking network printing?
Which of the following is blocking network printing?
Users report that they are unable to access network printing services. The security technician
checks the router access list and sees that web, email, and secure shell are allowed. Which of the
following is blocking network printing?
Which of the following authentication methods is Sara using?
In order for Sara, a client, to logon to her desktop computer, she must provide her username,
password, and a four digit PIN. Which of the following authentication methods is Sara using?