authorization
data integrity
confidentiality
authentication
第1题:
A.authorization
B.dataintegrity
C.confidentiality
D.authentication
第2题:
A. Provides users access to network resources.
B. Performs router commands after user authentication.
C. Provides users with remote access only capabilities.
D. Does not require an authentication server
第3题:
A.authorization
B.dataintegrity
C.confidentiality
D.authentication
第4题:
Which two components should be part of a security implementation plan?()
第5题:
第6题:
A. Authentication server
B. Session options
C. Authentication policy
D. End-point security policy
E. Role-mapping rules
第7题:
第8题:
A.authorization
B.dataintegrity
C.confidentiality
D.authentication
第9题:
第10题:
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()