Q1
Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made.
Options:
A) Accounting
B) Authorization
C) Authentication
Answer: A) Accounting
1/9
| Term | Definition |
|---|---|
Q1
Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made.
Options:
A) Accounting
B) Authorization
C) Authentication
| Answer: A) Accounting |
Q2
Uses a created set of attributes that describes the user’s access to the network.
Options:
A) Accounting
B) Authentication
C) Authorization
| Answer: C) Authorization |
Q3
Established using username and password combinations, challenge and response questions, token cards, and other methods.
Options:
A) Accounting
B) Authorization
C) Authentication | Answer: C) Authentication |
Q4
Collects and reports usage data so that it can be employed for purposes such as auditing or billing.
Options:
A) Authorization
B) Authentication
C) Accounting
| Answer: C) Accounting |
Q5
Users and administrators must prove that they are who they say they are.
Options:
A) Authorization
B) Authentication
C) Accounting
| Answer: B) Authentication |
Q6
What a user can and cannot do on the network.
Options:
A) Authentication
B) Authorization
C) Accounting
|
Answer: B) Authorization |
Q7
Specifies which resources the user can access and which operations the user is allowed to perform.
Options:
A) Authorization
B) Accounting
C) Authentication
| Answer: A) Authorization |
Q8
Provides leverage against individuals who perform malicious actions.
Options:
A) Accounting
B) Authorization
C) Authentication
| Answer: A) Accounting |
Q9
A way to control who is permitted to access a network.
Options:
A) Authentication
B) Authorization
C) Accounting
| Answer: A) Authentication |