If a user is a member of more than one group, then the permissions to a single resource assigned to the different groups are combined. What is the term used to describe the resulting permissions.
A. elective
B. combined
C. inheritance
D. effective
Answer: D
Computer Science & Information Technology
You might also like to view...
Describe the function and goal of Reliability Monitor in Windows 10.
What will be an ideal response?
Computer Science & Information Technology
The ____ states the reason for an e-mail message.
A. signature line B. greeting line C. subject line D. closing line
Computer Science & Information Technology
Which of the following protocols is used to validate whether trust is in place and accurate by returning responses of either "good", "unknown", or "revoked"?
A. CRL B. PKI C. OCSP D. RA
Computer Science & Information Technology
Clearly defined ____________________ numbers exist for every popular or well-known TCP/IP application.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology