What are the three components required to manage access control to a network and its resources?
What will be an ideal response?
ANSWER: The three components required are as follows:
* authentication-Authentication, in this case, user authentication, is the process of verifying a user's credentials (typically a username and password) to grant the user access to secured resources on a system or network. In other words, authentication asks the question, "Who are you?"
* authorization-Once a user has access to the network, the authorization process determines what the user can and cannot do with network resources. In other words, authorization asks the question, "What are you allowed to do?" Authorization restrictions affect Layer 2 segmentation, Layer 3 filtering, and Layer 7 entitlements. For example, what VLAN are you assigned to? What servers or databases can you access? What commands can you run on a device?
* accounting-The accounting system logs users' access and activities on the network. In other words, accounting asks, "What did you do?" The records that are kept in these logs are later audited, either internally or by an outside entity, to ensure compliance with existing organizational rules or external laws and requirements.
You might also like to view...
In which file format is a Muse site file saved?
What will be an ideal response?
SupplierName or PhoneNumber are examples of a ________
A) record B) data type C) field D) property
What is the difference between a stack and a layer? How can you use the z-index property to determine stacking order?
What will be an ideal response?
The most important and frequently used __________ is System.
Fill in the blank(s) with the appropriate word(s).