FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which network security device grants access to a network, determines what actions they can perform, and logs activities?
A
Firewall
B
Virtual Private Network (VPN)
C
Intrusion Prevention System (IPS)
D
Authorization, Authentication, Accounting (AAA)
Explanation: 

Detailed explanation-1: -AAA is an effective network controller that enables the authorized user to connect over the network with proof of credentials in accessing computer resources, determine what they are authorized to do, and track and record all activity during access.

Detailed explanation-2: -The cybersecurity AAA protocol determines which specific network resources the user has permission to access, such as a particular application, database, or online service. It also establishes the tasks and activities that users can perform within those authorized resources.

Detailed explanation-3: -AAA stands for authentication, authorization, and accounting. AAA is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.

Detailed explanation-4: -Answers Explanation & Hints: One of the components in AAA is authorization. After a user is authenticated through AAA, authorization services determine which resources the user can access and which operations the user is allowed to perform.

Detailed explanation-5: -Once the credentials of the user are authenticated, the authorization process determines what that specific user is allowed to do and access within the premise of the network. Users are categorized to know what type of operations they are allowed to perform such as an Administrator or Guest.

There is 1 question to complete.