________ enables administrators to customize the system’s access control policy using loadable kernel modules.
a) Linux security modules (LSMs)
b) mandatory access control (MAC)
c) pluggable authentication modules (PAMs)
d) access control attributes
a) Linux security modules (LSMs)
You might also like to view...
Match the shape or design with their description:
I. vertex A. point where a curve or line ends or meets in a free form shape II. selection net B. interior area of a shape III. fill C. area you define by dragging the mouse IV. picture fill D. shape filled with an image from a file V. gradient fill E. blend of two or more colors or shapes
Oracle RAC ____ is an application that adds to Oracle RAC by including the ability to integrate multiple databases into one cluster, further enhancing the scalability and fault tolerance of the architecture.
A. One String B. One Nod C. Compression D. Cache
When working with the unsorted portion of a list, the second step in a selection sort is to ____.
A. divide the list into two parts B. move the smallest element to the top of the list (position 0) C. move the smallest element to the beginning of the unsorted list D. find the smallest element
A(n) ________ is an Access object that outputs data in a meaningful way to those who view them.
Fill in the blank(s) with the appropriate word(s).