Access control is best described as which of the following?

A. The use of federated identities
B. The use of identification and authorization techniques
C. The elimination of risk when allowing users on a network
D. Reduction of social networking


Answer: B. The use of identification and authorization techniques

Computer Science & Information Technology

You might also like to view...

Calculate temperature (degrees F and C) at a given depth inside the earth (km)

What will be an ideal response?

Computer Science & Information Technology

Which of the following is texting software for sending short messages on a wireless service?

A) IM B) VoIP C) SMS D) WAP

Computer Science & Information Technology

The default value for the list-style-type property for ordered lists is ____.

A. Roman numbers B. Arabic numbers C. lowercase letters D. uppercase letters

Computer Science & Information Technology

You can change the desktop background to a color.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology