Information Storage Management 认证题库题解系列 题21

clip_image001

 

Work:

Access control services regulate user access to data. These services mitigate the threats of spoofing host identity and elevating host privileges. Both these
threats affect data integrity and confidentiality.

Access control mechanisms used in the application access domain are user and host authentication (technical control) and authorization (administrative
control). These mechanisms may lie outside the boundaries of the storage net-work and require various systems to interconnect with other enterprise identity
management and authentication systems, for example, systems that provide strong authentication and authorization to secure user identities against spoofing.

 

Answer:

Authentication and authorization.

posted on   中道学友  阅读(229)  评论(0编辑  收藏  举报

编辑推荐:
· AI与.NET技术实操系列:向量存储与相似性搜索在 .NET 中的实现
· 基于Microsoft.Extensions.AI核心库实现RAG应用
· Linux系列:如何用heaptrack跟踪.NET程序的非托管内存泄露
· 开发者必知的日志记录最佳实践
· SQL Server 2025 AI相关能力初探
阅读排行:
· 震惊!C++程序真的从main开始吗?99%的程序员都答错了
· 【硬核科普】Trae如何「偷看」你的代码?零基础破解AI编程运行原理
· 单元测试从入门到精通
· 上周热点回顾(3.3-3.9)
· winform 绘制太阳,地球,月球 运作规律

导航

< 2013年4月 >
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4
5 6 7 8 9 10 11

技术追求准确,态度积极向上

点击右上角即可分享
微信分享提示