O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Apply Your Knowledge

Review Questions

1:List the three access methodologies and describe the characteristics of each.
A1: Mandatory, discretionary, and role-based.

Mandatory access control is set up by a central authority (security team), and users have no capability to change permissions or rights.

Discretionary access control allows users to change rights and permissions at their discretion.

Role-based is a mixture of mandatory and discretionary. A security team sets up groups and assigns permissions and rights to the groups. Users have discretionary control over the permissions and rights in the guidelines set by the group.

2:What is the purpose of multifactor /authentication?
A2: Multifactor authentication is designed to overcome weaknesses ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required