COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which network security device grants access to a network, determines what actions they can perform, and logs activities?
A
Firewall
B
Virtual Private Network (VPN)
C
Intrusion Prevention System (IPS)
D
Authorization, Authentication, Accounting (AAA)
Explanation: 

Detailed explanation-1: -Cisco ACS. The Cisco Access Control System (ACS) is an AAA (Authentication, Authorization, Accounting) solution that provides policy-based security and enables the management of all network devices to access centrally.

Detailed explanation-2: -Authorization is a process by which a server determines if the client has permission to use a resource or access a file.

Detailed explanation-3: -The cybersecurity AAA protocol determines which specific network resources the user has permission to access, such as a particular application, database, or online service. It also establishes the tasks and activities that users can perform within those authorized resources.

Detailed explanation-4: -Once the credentials of the user are authenticated, the authorization process determines what that specific user is allowed to do and access within the premise of the network. Users are categorized to know what type of operations they are allowed to perform such as an Administrator or Guest.

There is 1 question to complete.