Multiple Choice
A ____ is one in which the computer system enforces the controls without the input or intervention of the system or data owner.
A) role based control
B) network access control (NAC)
C) mandatory access control (MAC)
D) discretionary access control (DAC)
Correct Answer:

Verified
Correct Answer:
Verified
Q40: Biometrics (retinal scans, fingerprints, and the like)
Q41: A(n) _ is a list of authorization
Q42: Match each item with a statement below.<br>a.Site-to-site
Q43: _ are hardware devices or software modules
Q44: Which centralized authentication method uses UDP?<br>A) TACACS+<br>B)
Q45: Which access control process documents the activities
Q46: Describe the drawbacks of using a VPN.
Q47: Match each item with a statement below.<br>a.Site-to-site
Q48: Match each item with a statement below.<br>a.Site-to-site
Q50: VPNs protect packets by performing IP _,