An attribute of a file system object that defines whether and how a file system object is audited
What will be an ideal response?
System access control list (SACL)
Computer Science & Information Technology
You might also like to view...
To get an Alice program to respond to an event, we must first add a(n) ____ for that event to our program.
A. action B. initializer C. listener D. template
Computer Science & Information Technology
When you select a picture, use these to change the picture height or width
A) Sizing handles B) PgUp PgDn C) Arrow keys
Computer Science & Information Technology
____ are resolution-dependent bitmap images, created with the painting or selection tools.
a. Layer shapes b. Layer locked areas c. Layer shadows d. Layer masks
Computer Science & Information Technology
The ________ of an asset is the value of an asset at the end of its useful life
A) depreciation B) principal C) salvage value D) death
Computer Science & Information Technology