O'Reilly logo

31 Days Before Your CCENT Certification by Scott Bennett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CCNA Discovery 2, Chapter 8

8.1.2: To protect data on a server, an administrator can encrypt the data and grant differing levels of access based on user accounts and group membership. Also, an administrator can use the following three-step process of authentication, authorization, and accounting (AAA) to improve security:

Step 1. Authentication requires users to verify their identity with a username and password using a RADIUS or TACACS server.

Step 2. Authorization limits access for users based on rights assigned to the user account by the administrator.

Step 3. Accounting tracks user network activity and application use.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required