Authentication and Authorization Basics

View this video about identification, authentication, and authorization in computer systems. As you watch, list the common identification methods and common authentication factors. What can be used to prove something you know, something you are, something you have, something you do, and somewhere you are? What are four methods of authentication? What is an implicit deny?

Source: PaceIT Online,
Creative Commons License This work is licensed under a Creative Commons Attribution 3.0 License.

Last modified: Thursday, November 19, 2020, 12:29 AM