Which term defines what an authenticated person can do with data?

A. Auditing
B. Authentication
C. Accounting
D. Authorization


Answer: D

Computer Science & Information Technology

You might also like to view...

________ refers to applications and services that are accessed over the Internet

A) The cloud B) Cloud storage C) DRM D) Cloud computing

Computer Science & Information Technology

The ____ filter allows multiple criteria to be selected and a sort order to be defined for the selected records.

A. AutoFilter B. Filter by Selection C. Filter B Form D. Advanced Filter/Sort

Computer Science & Information Technology

Every Word document you create is based on a(n) ____.

A. figure B. index C. template D. narrative

Computer Science & Information Technology

A network engineer is setting up a network for a company. There is a BYOD policy for the employees so that they can connect their laptops and mobile devices. Which of the following technologies should be employed to separate the administrative network from the network in which all of the employees' devices are connected?

A. VPN B. VLAN C. WPA2 D. MAC filtering

Computer Science & Information Technology