Question: QUESTION 27 Which type of authorization uses groups with pre-defined permissions to which users are assigned? A. Creator roles B. Read-only roles C. User access
QUESTION 27 Which type of authorization uses groups with pre-defined permissions to which users are assigned?
A. Creator roles
B. Read-only roles
C. User access roles
D. Permission roles
QUESTION 30
How does a man-in-the middle trap create another level of security?
|
| A. The man-in-the middle trap allows only one person to be between two doors, each with security measures, at a time. | |
|
| B. The man-in-the middle trap will not allow a person to exit if they do not have the verbal passcode to enter the data center. | |
|
| C. The man-in-the middle trap allows data center employees to trap intruders using trapdoors in the raised floor. | |
|
| D. The man-in-the middle trap forces users to spend time in the trap before entering the data center, so only those who really need in will enter. |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
