With ____, authorization is implemented by allowing the administrator to control which users or groups have the right to perform various administrative functions or to take any action that affects systemwide resources.

A. administrative privileges
B. permissions inheritance
C. user-based authorization
D. discretionary access to securable objects


Answer: A

Computer Science & Information Technology

You might also like to view...

main is a:

a) compiler directive b) comment c) function d) namespace

Computer Science & Information Technology

Of the classes below, the one that is most likely to be declared abstract is _________________.

a) Bat b) Squirrel c) Animal d) Iguana e) Parrot

Computer Science & Information Technology

? Referring to the figure above, one type of code that is included on the left side but not on the right is a(n) __________.

A. style rule B. comment C. declaration D. selector

Computer Science & Information Technology

Which of the following lets you know that Float is set to none?

A. 1 B. 2 C. 3 D. 4

Computer Science & Information Technology