GMU IT 223 Exam 2 (Lecture 5-9) Questions and Verified Answers | Passed | A+
What is access control? : authorized entities can use a system when they need to. How is policy related to access control? : Policy driven control of access to systems, data, and dialogues. Examples of access control include barriers, passwords, and bio-metrics. What is the role of authentication in access control? : Verification (or not) of an individual's claim (usually of identity). What is the role of authorization in access control? 2 : An entity (via his/her/its identity) is given certain permissions to access particular resources. What is the role of auditing in access control? : After-the-fact analysis of data collected about an individual's activities What are 4 different ways to authenticate a claim of identity? Can you give an example of each? : - What you know - a password for an account - What you have - a door key, a smart card - Who you are - fingerprint - What you do - how you pronounce a passphrase
Written for
- Institution
- GMU
- Course
- GMU
Document information
- Uploaded on
- June 5, 2024
- Number of pages
- 26
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
gmu it 223 exam 2 lecture 5 9 questions and veri