In our access control implementations and looking at the IAAA model what could we use for authentication?
A: Their username.
B: A password.
C: Role based access control.
CBK 5: Identity and Access Management
Source: ThorTeaches.com practice tests
B: Authentication: Something you know – Type 1 Authentication (passwords, pass phrase, PIN etc.). Something you have – Type 2 Authentication (ID, Passport, Smart Card, Token, cookie on PC etc.). Something you are – Type 3 Authentication (and Biometrics) (Fingerprint, Iris Scan, Facial geometry etc.).
IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.