Which of the following is considered a security principal? (Choose all that apply.)

a: Contacts

b: Computer Accounts

c: User Accounts

d: Distribution groups


b: Computer Accounts

c: User Accounts

Computer Science & Information Technology

You might also like to view...

_________________________ allows physical IT resources to provide multiple virtual images of themselves.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ________ is a hierarchy of bullets and sub-bullets

A) detail list B) chronological list C) list level D) alphabetic level

Computer Science & Information Technology

________ functions are used to describe a collection of data such as totals, counts, and averages

A) Logical B) Text C) Statistical D) Financial

Computer Science & Information Technology

Information architects work as independent ____________________ or as part of in-house Web design teams.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology