What are the three components required to manage access control to a network and its resources?

What will be an ideal response?

ANSWER: The three components required are as follows:
* authentication-Authentication, in this case, user authentication, is the process of verifying a user's credentials (typically a username and password) to grant the user access to secured resources on a system or network. In other words, authentication asks the question, "Who are you?"
* authorization-Once a user has access to the network, the authorization process determines what the user can and cannot do with network resources. In other words, authorization asks the question, "What are you allowed to do?" Authorization restrictions affect Layer 2 segmentation, Layer 3 filtering, and Layer 7 entitlements. For example, what VLAN are you assigned to? What servers or databases can you access? What commands can you run on a device?
* accounting-The accounting system logs users' access and activities on the network. In other words, accounting asks, "What did you do?" The records that are kept in these logs are later audited, either internally or by an outside entity, to ensure compliance with existing organizational rules or external laws and requirements.

Computer Science & Information Technology

You might also like to view...

Camera shake can be reduced by looking for a camera that provides ________

A) a digital zoom B) image stabilization C) burst mode D) an optical zoom

Computer Science & Information Technology

The ________ shows tabs, indents, and margins on a Word document

Fill in the blank(s) with correct word

Computer Science & Information Technology