Authentication and Authorization Basics
View this video about identification, authentication, and authorization in computer systems. As you watch, list the common identification methods and common authentication factors. What can be used to prove something you know, something you are, something you have, something you do, and somewhere you are? What are four methods of authentication? What is an implicit deny?
Last modified: Thursday, November 19, 2020, 12:29 AM