Linux uses ________ to support authentication via interfaces including smart cards, Kerberos and voice authorization systems.
a) Linux security modules (LSMs)
b) mandatory access control (MAC)
c) pluggable authentication modules (PAMs)
d) SELinux
c) pluggable authentication modules (PAMs)
Computer Science & Information Technology
You might also like to view...
Hypertext can contain:
A) a Java application program B) exception methods C) executable code D) a link to another Web page
Computer Science & Information Technology
In order to add more channels to meet the demand of the increased popularity of cell phones, the FCC opened up a range of frequencies from 1850 MHz to 1990 MHz known as the 1900 band
Indicate whether the statement is true or false
Computer Science & Information Technology
Defining data as a table prior to sorting the data is optional
Indicate whether the statement is true or false
Computer Science & Information Technology
Outlook stores calendar items in a folder named ____ by default.
A. Items B. Personal C. Schedule D. Calendar
Computer Science & Information Technology