Now to the second major bullet on the same slide:
For Question 6 thru 10, you are to research any one operating system of your choice – desktop, server, or smart device and investigate how the following access and account management controls are implemented and used:
6. 7. 8. 9. 10.
Access Control Updates and patches
Event Logging
Backup and Restoring Data Two factor authentication
Here’s an example:
Answer 10. For two factor authentication (2FA), which relates to having at least two verifiable independent secrets for access, the Android OS set up allows you to add a phone number to receive and confirm a 6-digit code under “two-step verification”.
ANSWER:-
6. Access Control:-
7. Updates and patches:-
8. Event Logging:-
9. Backup and Restoring Data:-
10. Two factor authentication:-
Now to the second major bullet on the same slide: For Question 6 thru 10, you...