Regarding JAAS, the term ____ is used to represent a name associated with a subject.

A. Subject
B. Resource
C. Credential
D. Principal


Answer: D

Computer Science & Information Technology

You might also like to view...

XML elements _________________.

a) cannot begin with “xml” b) cannot begin with any combination of uppercase and lowercase of “xml” c) can begin with “xml” d) a and b

Computer Science & Information Technology

Draw a use case and write up a use case scenario for getting two or three email accounts. Think aBout the steps that are needed to ensure security.\

The use case scenario follows.

Computer Science & Information Technology

The Excel Web App ________ tab includes these commands: Refresh Selected Connection, Refresh All Connections, Calculate Workbook, Sort Ascending, and Sort Descending

A) INSERT B) FORMULAS C) HOME D) DATA

Computer Science & Information Technology

The most economically damaging kinds of computer crime are e-mail viruses.

a. true b. false

Computer Science & Information Technology