What are the four processes encompassed by access control?
What will be an ideal response?
Identification-obtaining the identity of the entity requesting access to a logical or physical area
Authentication-confirming the identity of the entity seeking access to a logical or physical area
Authorization-determining which actions that entity can perform in that physical or logical area
Accountability-documenting the activities of the authorized individual and systems
You might also like to view...
Give examples of schedules that would be accepted at
a. SNAPSHOT isolation but not REPEATABLE READ. b. SERIALIZABLE but not SNAPSHOT isolation. (Hint: T2 performs a write after T1 has committed.)
Match each term to its description.
A. Separate presentation that is linked to a primary custom show or presentation B. This is used to analyze a presentation C. A booth used to show a presentation D. Open when you view comments and changes to a presentation from a reviewer E. Separate presentation or a presentation that includes slides from the original presentation F. Includes ten placeholders than can be modified G. Internet address H. Helps to direct audience's attention to specific area of presentation I. Used when only specific people should view your presentation J. Used to set a password
Combining the ORDER_LINE and ORDERS tables will ____.
A. save space in the table B. make the table more effective C. increase space in the table D. make a more complicated table
Tracking individual clients as they visit a website is known as ________.
a. session tracking. b. client tracking. c. personalization. d. None of the above.