Multiple Choice
Match each item with a statement below.
-This principle limits individuals' information access to what is required to perform their jobs.
A) authentication
B) least privilege
C) discretionary access controls
D) authorization
E) separation of duties
F) identification
G) need to know
H) nondiscretionary access controls
I) accountability
Correct Answer:

Verified
Correct Answer:
Verified
Q36: Compare TACACS+ and RADIUS with regard to
Q37: What are the four processes encompassed by
Q38: Most organizations do not need the detailed
Q39: What is a disadvantage of centralized authentication?
Q40: IEEE 802.1x is one of the fastest
Q42: Match each item with a statement below.<br>-This
Q43: In _, access to a specific set
Q44: A PIN is an example of something
Q45: _ authentication is most commonly set up
Q46: Access controls are defined only using technology.