An attribute of a file system object that defines whether and how a file system object is audited

What will be an ideal response?


System access control list (SACL)

Computer Science & Information Technology

You might also like to view...

To get an Alice program to respond to an event, we must first add a(n) ____ for that event to our program.

A. action B. initializer C. listener D. template

Computer Science & Information Technology

When you select a picture, use these to change the picture height or width

A) Sizing handles B) PgUp PgDn C) Arrow keys

Computer Science & Information Technology

____ are resolution-dependent bitmap images, created with the painting or selection tools.

a. Layer shapes b. Layer locked areas c. Layer shadows d. Layer masks

Computer Science & Information Technology

The ________ of an asset is the value of an asset at the end of its useful life

A) depreciation B) principal C) salvage value D) death

Computer Science & Information Technology