Which term defines what an authenticated person can do with data?
A. Auditing
B. Authentication
C. Accounting
D. Authorization
Answer: D
You might also like to view...
________ refers to applications and services that are accessed over the Internet
A) The cloud B) Cloud storage C) DRM D) Cloud computing
The ____ filter allows multiple criteria to be selected and a sort order to be defined for the selected records.
A. AutoFilter B. Filter by Selection C. Filter B Form D. Advanced Filter/Sort
Every Word document you create is based on a(n) ____.
A. figure B. index C. template D. narrative
A network engineer is setting up a network for a company. There is a BYOD policy for the employees so that they can connect their laptops and mobile devices. Which of the following technologies should be employed to separate the administrative network from the network in which all of the employees' devices are connected?
A. VPN B. VLAN C. WPA2 D. MAC filtering