______________ involves defining what a person accessing data can do with it.

a. encryption
b. nonrepudiation
c. authentication
d. authorization


Answer: d. Authorization

Computer Science & Information Technology

You might also like to view...

The primary advantage of DOS is its

A) Small footprint B) Compatibility with other systems C) Ease of use D) Simple language

Computer Science & Information Technology

Case WDX 2-1Stephen is creating a chart that displays the sales data for the past year. Stephen found an error in the chart data. How can he fix it?

A. On the Chart Tools Design tab, click the Edit Data button B. On the Chart Tools Layout tab, click the Legend button C. On the Chart Tools Layout tab, click the Data Labels button D. On the Chart Tools Design tab, click the Change Chart Type button

Computer Science & Information Technology

A security administrator has installed a new KDC for the corporate environment. Which of the following authentication protocols is the security administrator planning to implement across the organization?

A. LDAP B. RADIUS C. Kerberos D. XTACACS

Computer Science & Information Technology

You can use the compound ____ to combine two strings.

A. value separator B. equals comparison C. assignment operator D. declaration operator

Computer Science & Information Technology