Completion requirements
View this video about identification, authentication, and authorization in computer systems. As you watch, list the common identification methods and common authentication factors. What can be used to prove something you know, something you are, something you have, something you do, and somewhere you are? What are four methods of authentication? What is an implicit deny?
Source: PaceIT Online, https://www.youtube.com/watch?v=60S_Vq5R4J0 This work is licensed under a Creative Commons Attribution 3.0 License.
Last modified: Friday, August 2, 2024, 11:10 AM