Derek’s supervisor is concerned that the company’s security system does not comply with the new standards the company has decided to employ. She has asked Derek to determine how members of the company are authenticated on the network.
What does the computer or server use to verify the access to a specific resource on the network?
A. Access control list
B. Directory permissions
C. Login script
D. Digital Certificate
Answer: A
You might also like to view...
Match each item with a statement below.
A. Blocks of data that a Web server stores on a client system to identify visitors to a Web site B. Data in a program or application that is designed to handle a specific situation C. Various access control technologies that restrict the use of proprietary software, hardware, or content D. A feature in Windows Web browsers that prevents others from seeing what sites and content you look at on the Web E. A word, phrase, symbol, or image that you click to move from one Web location to another F. A program that performs a repetitive or time-consuming task on a network or the Internet G. A Web site that serves as a gateway to the Internet H. An address used in a Web browser to locate a resource on the Internet I. An Internet program that searches for keywords and phrases J. A leading commercial-grade distribution of an open source dynamic programming language
The five basic components or subsystems of biometric ID systems are:
A. data collection, transmission, signal processing, storage, decision B. feature extraction, quality control, pattern matching, and pattern classification C. data collection, quality control, pattern matching, transmission D. data collection, transmission, signal processing, storage, quality control E. none of the above