Skip to main content

Section 7.5 Review Questions

  1. What is the difference between authentication and authorization?
  2. Describe three technologies used to control physical access?
  3. Imagine you are writing security policies for a mid-sized corporation. What would your policy be regarding the use of SSH keys? Why?
You have attempted 1 of 1 activities on this page.