1. Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made.
- Authentication
- Authorization
- Accounting
2. Uses a created set of attributes that describes the user’s access to the network.
- Authentication
- Authorization
- Accounting
3. Established using username and password combinations, challenge and response questions, token cards, and other methods.
- Authentication
- Authorization
- Accounting
4. Collects and reports usage data so that it can be employed for purposes such as auditing or billing.
- Authentication
- Authorization
- Accounting
5. Users and administrators must prove that they are who they say they are.
- Authentication
- Authorization
- Accounting
6. What a user can and cannot do on the network.
- Authentication
- Authorization
- Accounting
7. Specifies which resources the user can access and which operations the user is allowed to perform.
- Authentication
- Authorization
- Accounting
8. Provides leverage against individuals who perform malicious actions.
- Authentication
- Authorization
- Accounting
9. A way to control who is permitted to access a network.
- Authentication
- Authorization
- Accounting