ExamGecko
Question list
Search
Search

Question 251 - FC0-U61 discussion

Report
Export

Employees must use a badge to enter and exit the building. Each time the badge is used, a log entry is created and stored to record who has entered and exited the building. Which of the following best describes what the log entries provide?

A.
Automation
Answers
A.
Automation
B.
Accounting
Answers
B.
Accounting
C.
Authorization
Answers
C.
Authorization
D.
Authentication
Answers
D.
Authentication
Suggested answer: B

Explanation:

The log entries that are created and stored when employees use their badges to enter and exit the building provide accounting. Accounting is a security function that records and tracks user activities and events on a system or network. Accounting can provide evidence of user actions, such as authentication, authorization, access, modification, or deletion of data or resources. Accounting can also provide information for billing, auditing, or reporting purposes. Accounting can be implemented using log files, audit trails, or monitoring tools. Automation is not a security function, but rather a process of using technology to perform tasks or operations without human intervention. Automation can improve productivity, efficiency, accuracy, or reliability of a system or network. Automation can be implemented using scripts, programs, or tools. Authorization is not a security function that records and tracks user activities and events, but rather a security function that grants or denies user access to data or resources based on their identity and permissions. Authorization can ensure that users only access what they are allowed to access on a system or network. Authorization can be implemented using access control lists (ACLs), role-based access control (RBAC), or mandatory access control (MAC). Authentication is not a security function that records and tracks user activities and events, but rather a security function that verifies user identity based on credentials, such as passwords, tokens, biometrics, etc. Authentication can ensure that users are who they claim to be on a system or network. Authentication can be implemented using single-factor authentication (SFA), multi-factor authentication (MFA), or single sign-on (SSO). References: The Official CompTIA IT Fundamentals (ITF+) Student Guide (Exam FC0-U61), Chapter 7: Security Concepts1

asked 02/10/2024
Katrina Allangba
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first