7..1.6 Check Your Understanding

Created by yabdelaziz

Q1 Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made. Options: A) Accounting B) Authorization C) Authentication
Answer: A) Accounting

1/9

TermDefinition
Q1 Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made. Options: A) Accounting B) Authorization C) Authentication Answer: A) Accounting
Q2 Uses a created set of attributes that describes the user’s access to the network. Options: A) Accounting B) Authentication C) Authorization Answer: C) Authorization
Q3 Established using username and password combinations, challenge and response questions, token cards, and other methods. Options: A) Accounting B) Authorization C) AuthenticationAnswer: C) Authentication
Q4 Collects and reports usage data so that it can be employed for purposes such as auditing or billing. Options: A) Authorization B) Authentication C) Accounting Answer: C) Accounting
Q5 Users and administrators must prove that they are who they say they are. Options: A) Authorization B) Authentication C) Accounting Answer: B) Authentication
Q6 What a user can and cannot do on the network. Options: A) Authentication B) Authorization C) Accounting Answer: B) Authorization
Q7 Specifies which resources the user can access and which operations the user is allowed to perform. Options: A) Authorization B) Accounting C) Authentication Answer: A) Authorization
Q8 Provides leverage against individuals who perform malicious actions. Options: A) Accounting B) Authorization C) Authentication Answer: A) Accounting
Q9 A way to control who is permitted to access a network. Options: A) Authentication B) Authorization C) Accounting Answer: A) Authentication