System Administration and IT Infrastructure Service Latest 2022
Contains a lookup service that provides mapping between network resources and their network addresses Directory Server Active Directory stores a ____________________________ of the password. One-way cryptographic hash This method of authentication can employ the help of security protocols like TLS. Requires the client and the directory server to authenticate using some method. One of the most common methods is using Kerberos. SASL Authentication. Passwords can be easily turned into a ______________, but _____________ cant be easily turned back into passwords. Hash/Hashes In most organizations, access to computer and network resources is based on Your role in the organization If there's more then one person who can _______________ using the same username and password, then __________________ becomes difficult or even impossible Authenticate Auditing A network authentication protocol that's used to authenticate user identity, secure the transfer of user credentials, and more. Kerberos If someone forgets there password. Someone with Sysadmin responsibilities, may be authorized to _____________ their password for them. Reset
Geschreven voor
- Instelling
- Western Governors University
- Vak
- System Administration And IT Infrastructure Servic
Documentinformatie
- Geüpload op
- 13 oktober 2022
- Aantal pagina's
- 7
- Geschreven in
- 2022/2023
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
system administration and it infrastructure service latest 2022