Be careful not to confuse authentication with authorization.
Authentication is the process of verifying the identity of the sender and/or
receiver of information. Authorization establishes what the user is allowed
to do once the user has been identified and authenticated by the system.
Another “A” term sometimes misinterpreted is accountability, which is the
ability to track actions to users.
מיין לפי
What is the best method of reducing a brute-force denial-of-service
attack against a password file?
Denial-of-service attack, whereby the perpetrator is able to lock
out many users by discovering their user identifications and entering a
specified number of invalid passwords, is minimized.
מיין לפי
Which of the following is a characteristic of a synchronous token?
The watchdog function is used to validate TCP sessions when
data is not sent for extended periods of time. This functionality is often
referred to as TOC/TOU (Time of Check versus Time of Use) validation.
מיין לפי
What is a security benefit related to thin-client architecture?
Constrained user interfaces restrict user access to specific system
resources by not allowing them to request the function, information,
or access to specific system resources.