Briefly describe authorization.
What will be an ideal response?
Authorization picks up where authentication leaves off. After a user is authenticated, the authorization system uses access-control technologies to implement the second phase of protecting resources. It determines if an authenticated user has the correct authorization to access a resource. Authorization enforcement can come in one of two ways: total denial of access to unauthorized users or limiting the extent of access provided to an authorized user. As in authentication, multiple schools of thought have been developed to support authorization over the years.
You might also like to view...
Servers are essential in today's business world because they can centralize security and other resources
Indicate whether the statement is true or false
________ emphasize a cell or range of cells
A) Criteria B) Arguments C) Borders and shading D) Formulas
To authorize your DHCP server, you must be a member of the ________ Adminsgroup
Fill in the blank(s) with correct word
When inserting a table, you must specify the total number of rows and columns required, which is called the ____________________ of the table.
Fill in the blank(s) with the appropriate word(s).