How are authentication and access control different? Read each description and identify as "authentication only" or "access control only": Can use lists to set security levels such as Top Secret, Secret, and Confidential Compares credentials to those established during the identification process Includes Kerberos Answers only the question of whether the person is who they claimed to be when the identification process was completed Limits which subjects may interact with specific objects Refers to all security features unauthorized access to a computer system or network Associated with a user confirming his or her identity by some means Specifies what operations the user can perform Uses roles Uses single sign-on (SSO)

Q&A Education