Discussion and a question
OK, It's too quiet in here so I am just putting this out for discussion. I'll post the answer later. If this turns out to be poplular, we can do it more often. I will start with an easy one on access control:
The steps of an access control model should follow which logical flow:
a. Identification, accountability, authorization
b. Authorization, Identification, authentication
c. Identification, authentication, authorization
d. Authentication, Authorization, Identification
The steps of an access control model should follow which logical flow:
a. Identification, accountability, authorization
b. Authorization, Identification, authentication
c. Identification, authentication, authorization
d. Authentication, Authorization, Identification
Lack of will power has caused more failure than lack of intelligence or ability.
Comments
-
mikeyoung Member Posts: 101Well you ought to! You're a natural. But that one was pretty easy.
Let me come up with a harder one.Lack of will power has caused more failure than lack of intelligence or ability. -
jkstech Member Posts: 330it's on my list....
i definately am interested in security
i just want to get my microsft 2003 track finished first
then i will be moving on to other things such as this wonderful areaget back to studying!!!