A user accessing a computer system must present credentials or ____ when logging on to the system.
a. identification
b. token
c. access
d. authorize
A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
a. reference monitor
b. subject
c. label
d. entity
A(n) ____ is a set of permissions that are attached to an object.
a. entity
b. ACE
c. DAC
d. ACL
During RADIUS authentication the AP, serving as the authenticator that will accept or reject the wireless device, creates a data packet from this information called the ____.
a. authentication request
b. access request
c. accounting request
d. verification request
The action that is taken by the subject over the object is called a(n) ____.
a. control
b. access
c. operation
d. authorization
____ is an authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
a. Kerberos
b. FTP
c. RADIUS
d. TACACS
____ is an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
a. Aurora
b. CHAP
c. TACACS
d. Kerberos
____ is often used for managing user access to one or more systems.
a. Rule Based Access Control
b. Role Based Access Control
c. Mandatory Access Control
d. Discretionary Access Control
A computer user may be authorized or granted permission to log on to a system by presenting valid credentials, yet that authorization does not mean that the user can then access any and all resources.
TACACS+ and RADIUS are designed to support hundreds of remote connections.