COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Occurs when a user is given access to a certain piece of data or certain areas of a building
A
Availability
B
Accounting
C
Authorization
D
Administration
Explanation: 

Detailed explanation-1: -The process by which access to those resources is restricted to a certain number of users is called access control. The authentication process always comes before the authorization process.

Detailed explanation-2: -Authorization is a process by which a server determines if the client has permission to use a resource or access a file. Authorization is usually coupled with authentication so that the server has some concept of who the client is that is requesting access.

There is 1 question to complete.