Discussion and a question

mikeyoungmikeyoung Posts: 101Member
OK, It's too quiet in here so I am just putting this out for discussion. I'll post the answer later. If this turns out to be poplular, we can do it more often. I will start with an easy one on access control:

The steps of an access control model should follow which logical flow:

a. Identification, accountability, authorization

b. Authorization, Identification, authentication

c. Identification, authentication, authorization

d. Authentication, Authorization, Identification
Lack of will power has caused more failure than lack of intelligence or ability.


Sign In or Register to comment.