IT Security_ Defense against the digital dark arts - Week 3 16. How is auditing related to accounting?: Accounting is recording access and usage, while auditing is reviewing these records. 17. Authentication is concerned with determining .: Identity 18. Which of the following are valid multi-factor authentication factors? Check all that apply.: something you have and something you are, and something you know 19. Security Keys are more ideal than OTP generators because they're resis- tant to attacks.: Phishing 20. In the three As of security, what is the process of proving who you claim to be?: Authentication 21. Which of these passwords is the strongest for authenticating to a sys- tem?: P@w04d!$$L0N6 22. In a Certificate Authority (CA) infrastructure, why is a client certificate used?: To authenticate the server 23. What is used to request access to services in the Kerberos process?: - Ticket Granting tiket

Contact the Author

Please Sign In to contact this author.