Discussion and a question

mikeyoungmikeyoung Member Posts: 101
OK, It's too quiet in here so I am just putting this out for discussion. I'll post the answer later. If this turns out to be poplular, we can do it more often. I will start with an easy one on access control:

The steps of an access control model should follow which logical flow:

a. Identification, accountability, authorization

b. Authorization, Identification, authentication

c. Identification, authentication, authorization

d. Authentication, Authorization, Identification
Lack of will power has caused more failure than lack of intelligence or ability.

Comments

Sign In or Register to comment.