Match each item with a statement below.
A. An open source security package
B. A common security technique that utilizes encrypted keys
C. A set of rules that limits a user's access to database resources
D. A set of related privileges that are combined to provide a centralized unit from which to manage similar users or objects of a database
E. A unique key that is used to validate a person's identification, for the purpose of gaining access into a secured environment
F. A password-protected and encrypted file that holds the identity of a user or object
G. Offers encryption of both information transmitting across the network and stored within the database and provides strong and proxy authentication strategies that support and integrate with the industry-standard authentication methods
H. The ability to access a specific database resource or to perform a specific action within a database
I. An authentication protocol that was built by MIT
A. Securich
B. public key infrastructure (PKI)
C. user profile
D. role
E. service ticket
F. digital certificate
G. Advanced Security
H. privilege
I. Kerberos
You might also like to view...
When you click a control in Layout view, a(n) ________ border appears around the control
Fill in the blank(s) with correct word
In Windows 7 the default view in Windows Explorer shows your libraries
Indicate whether the statement is true or false
The purpose of the ____ handshake is to authenticate the GTK.
A. group key B. four-way C. five-way D. MK
The term occurrence is used to describe the number of attributes or fields pertaining to a specific entity.
Answer the following statement true (T) or false (F)