3.4k views
4 votes
Please someone help me with this !!

Please someone help me with this !!-example-1
User Cassey
by
3.6k points

1 Answer

10 votes

Answer:

deletion of files: authentication

unpleasant comments: MAC address filtering

interception: encryption

access network: firewall

Step-by-step explanation:

Note that authentication is about proving who you are, and not about what you're allowed to do. So authentication by itself is only the first step. Next, you have to lookup the authorizations of the authenticated person to allow or disallow an action.

User Jaetzold
by
4.2k points