|1:||List the three access methodologies and describe the characteristics of each.|
|A1:||Mandatory, discretionary, and role-based.
Mandatory access control is set up by a central authority (security team), and users have no capability to change permissions or rights.
Discretionary access control allows users to change rights and permissions at their discretion.
Role-based is a mixture of mandatory and discretionary. A security team sets up groups and assigns permissions and rights to the groups. Users have discretionary control over the permissions and rights in the guidelines set by the group.
|2:||What is the purpose of multifactor /authentication?|
|A2:||Multifactor authentication is designed to overcome weaknesses ...|