160,591 views
6 votes
6 votes
Please someone help me with this !!

Please someone help me with this !!-example-1
User Pradi KL
by
3.3k points

1 Answer

14 votes
14 votes

Answer:

deletion of files: authentication

unpleasant comments: MAC address filtering

interception: encryption

access network: firewall

Step-by-step explanation:

Note that authentication is about proving who you are, and not about what you're allowed to do. So authentication by itself is only the first step. Next, you have to lookup the authorizations of the authenticated person to allow or disallow an action.

User Hampo
by
2.5k points