How is authentication performed using security principals?
What will be an ideal response?
Authentication is performed during logon when a user requests access to a system. The user provides credentials and the host system authenticates the identity of the user against an authentication database. A user in this context is also known as a security principal, someone who can request access to a resource. Security principals can be organized as single users or as groups.
You might also like to view...
Case-Based Critical Thinking QuestionsCase 1: MTN OutdoorYou have just started working for MTN Outdoor as a programmer. Your first assignment is to review and correct various code to use sub procedures and/or functions. Which of the following statements would invoke the GetEndInventory function and assign the function's return value to the intEnd variable?
A. Call GetEndInventory(intBegInv, intItemsSold, intReturned) B. intEnd = Call GetEndInventory(intBegInv, intItemsSold, intReturned) C. intEnd = GetEndInventory(intBegInv, intItemsSold, intReturned) D. intEnd = GetEndInventory()
It is the ability of a computer to perform ____ operations that separates it from other types of calculating devices.
A. arithmetic B. input C. logical D. output
Virtual machines cannot be run using actual disks, passed directly to the virtual machine
Indicate whether the statement is true or false
The ____________________ level of a message indicates to the recipient the priority level of an e-mail message.
Fill in the blank(s) with the appropriate word(s).