Q1
Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made.
Options:
A) Accounting
B) Authorization
C) Authentication
Answer: A) Accounting
1/9
| Term | Definition |
|---|---|
| Q1 Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made. Options: A) Accounting B) Authorization C) Authentication | Answer: A) Accounting |
| Q2 Uses a created set of attributes that describes the user’s access to the network. Options: A) Accounting B) Authentication C) Authorization | Answer: C) Authorization |
| Q3 Established using username and password combinations, challenge and response questions, token cards, and other methods. Options: A) Accounting B) Authorization C) Authentication | Answer: C) Authentication |
| Q4 Collects and reports usage data so that it can be employed for purposes such as auditing or billing. Options: A) Authorization B) Authentication C) Accounting | Answer: C) Accounting |
| Q5 Users and administrators must prove that they are who they say they are. Options: A) Authorization B) Authentication C) Accounting | Answer: B) Authentication |
| Q6 What a user can and cannot do on the network. Options: A) Authentication B) Authorization C) Accounting | Answer: B) Authorization |
| Q7 Specifies which resources the user can access and which operations the user is allowed to perform. Options: A) Authorization B) Accounting C) Authentication | Answer: A) Authorization |
| Q8 Provides leverage against individuals who perform malicious actions. Options: A) Accounting B) Authorization C) Authentication | Answer: A) Accounting |
| Q9 A way to control who is permitted to access a network. Options: A) Authentication B) Authorization C) Accounting | Answer: A) Authentication |