Linux uses ________ to support authentication via interfaces including smart cards, Kerberos and voice authorization systems.

a) Linux security modules (LSMs)
b) mandatory access control (MAC)
c) pluggable authentication modules (PAMs)
d) SELinux


c) pluggable authentication modules (PAMs)

Computer Science & Information Technology

You might also like to view...

Hypertext can contain:

A) a Java application program B) exception methods C) executable code D) a link to another Web page

Computer Science & Information Technology

In order to add more channels to meet the demand of the increased popularity of cell phones, the FCC opened up a range of frequencies from 1850 MHz to 1990 MHz known as the 1900 band

Indicate whether the statement is true or false

Computer Science & Information Technology

Defining data as a table prior to sorting the data is optional

Indicate whether the statement is true or false

Computer Science & Information Technology

Outlook stores calendar items in a folder named ____ by default.

A. Items B. Personal C. Schedule D. Calendar

Computer Science & Information Technology