7..1.6 Check Your Understanding

Created by yabdelaziz

Q1 Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made. Options: A) Accounting B) Authorization C) Authentication
Answer: A) Accounting

1/9

TermDefinition
Q1 Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made. Options: A) Accounting B) Authorization C) Authentication
Answer: A) Accounting
Q2 Uses a created set of attributes that describes the user’s access to the network. Options: A) Accounting B) Authentication C) Authorization
Answer: C) Authorization
Q3 Established using username and password combinations, challenge and response questions, token cards, and other methods. Options: A) Accounting B) Authorization C) Authentication
Answer: C) Authentication
Q4 Collects and reports usage data so that it can be employed for purposes such as auditing or billing. Options: A) Authorization B) Authentication C) Accounting
Answer: C) Accounting
Q5 Users and administrators must prove that they are who they say they are. Options: A) Authorization B) Authentication C) Accounting
Answer: B) Authentication
Q6 What a user can and cannot do on the network. Options: A) Authentication B) Authorization C) Accounting
Answer: B) Authorization
Q7 Specifies which resources the user can access and which operations the user is allowed to perform. Options: A) Authorization B) Accounting C) Authentication
Answer: A) Authorization
Q8 Provides leverage against individuals who perform malicious actions. Options: A) Accounting B) Authorization C) Authentication
Answer: A) Accounting
Q9 A way to control who is permitted to access a network. Options: A) Authentication B) Authorization C) Accounting
Answer: A) Authentication