Mile2 Cybersecurity Certifications

Cybersecurity Certifications

OCU ISCAP A Week 01 Lesson 03 Discussion

Viewing 1 reply thread
  • Author
    Posts
    • #91478
      Manny Varela
      Keymaster

      Explain what these have in common:  identity management, authentication techniques, single sign-on, and access control monitoring.  Use at least 2 terms with each when discussing the commonalities.  Present examples from both the text and the video.

    • #91780
      Aaron Elliott
      Participant

      Identity management, authentication techniques, single sign on, and access control monitoring all are used in protecting a network from unauthorized users from gaining access to a network, along with assigning a unique identifier to users that is used to authorize access privileges. The mentioned terms strengthen authentication of user access to a network more than just username and password, using something the user would only know or be assigned like an authenticator, along with monitoring of user activity if any unauthorized users slip by.

      • #91817
        Kanthony
        Participant

        Touch on more of the details from the video too. That will help you so much to learn this.

Viewing 1 reply thread
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .