With ____, authorization is implemented by allowing the administrator to control which users or groups have the right to perform various administrative functions or to take any action that affects systemwide resources.
A. administrative privileges
B. permissions inheritance
C. user-based authorization
D. discretionary access to securable objects
Answer: A
Computer Science & Information Technology
You might also like to view...
main is a:
a) compiler directive b) comment c) function d) namespace
Computer Science & Information Technology
Of the classes below, the one that is most likely to be declared abstract is _________________.
a) Bat b) Squirrel c) Animal d) Iguana e) Parrot
Computer Science & Information Technology
?
Referring to the figure above, one type of code that is included on the left side but not on the right is a(n) __________.
A. style rule B. comment C. declaration D. selector
Computer Science & Information Technology
Which of the following lets you know that Float is set to none?
A. 1 B. 2 C. 3 D. 4
Computer Science & Information Technology