8.1.2: To protect data on a server, an administrator can encrypt the data and grant differing levels of access based on user accounts and group membership. Also, an administrator can use the following three-step process of authentication, authorization, and accounting (AAA) to improve security:
Step 1. Authentication requires users to verify their identity with a username and password using a RADIUS or TACACS server.
Step 2. Authorization limits access for users based on rights assigned to the user account by the administrator.
Step 3. Accounting tracks user network activity and application use.
No credit card required