A directory is also an object to which access should be controlled. Why is it not appropriate to allow users to modify their own directories?
What will be an ideal response?
The
user
might
assign
himself
or
herself
unauthorized
rights
to
objects
to
which
he
or
she
has
limited
legitimate
access.
There
is
also
an
integrity
problem.
You might also like to view...
The ____ button allows you to edit all selected objects of the frames within the onion skin markers at one time.
A. Edit Multiple Frames B. Onion Skin Outlines C. Modify Onion Markers D. Onion Skin
The ____________________ database template creates a database with an empty table in it.
Fill in the blank(s) with the appropriate word(s).
The ____ contains algorithms that only look at the elements in a container and that move the elements of a container.
A. ATL B. DTL C. ASTL D. STL
The stage of the plan-protect response cycle that consumes the most time is ________.
A. hacking B. response C. protection D. planning