Section 7.5 Review Questions
-
What is the difference between authentication and authorization?
-
Describe three technologies used to control physical access?
-
Imagine you are writing security policies for a mid-sized corporation. What would your policy be regarding the use of SSH keys? Why?
You have attempted 1 of 1 activities on this page.