What specific name is given to describe a security policy based on access control lists?

A. Network Security Group
B. Access Control List
C. Security Priority Group
D. Secure Access List


Answer: A

Computer Science & Information Technology

You might also like to view...

Restore points are created at regular intervals and just before you install software or hardware by what utility?

A. System Activation B. System Protection C. System Restoration D. System Prevention

Computer Science & Information Technology

The ________ is the display that you see after you turn on your computer and respond to the username and password prompts

Fill in the blank(s) with correct word

Computer Science & Information Technology

An asset is a valued resource that the application has to protect.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Find an equation of a line given the following information. The final answer should be left in slope-intercept form. Slope undefined passes through

What will be an ideal response?

Computer Science & Information Technology