A couple of the topics we discussed was authentication and authorization. Is it possible to have authorization without authentication? Justify your response. Discuss biometrics. Identify the most widely used technology and why this is the case. What are the relationships between a trusted and an untrusted network?

Leave a Reply

Your email address will not be published. Required fields are marked *