______________ involves defining what a person accessing data can do with it.
a. encryption
b. nonrepudiation
c. authentication
d. authorization
Answer: d. Authorization
You might also like to view...
The primary advantage of DOS is its
A) Small footprint B) Compatibility with other systems C) Ease of use D) Simple language
Case WDX 2-1Stephen is creating a chart that displays the sales data for the past year. Stephen found an error in the chart data. How can he fix it?
A. On the Chart Tools Design tab, click the Edit Data button B. On the Chart Tools Layout tab, click the Legend button C. On the Chart Tools Layout tab, click the Data Labels button D. On the Chart Tools Design tab, click the Change Chart Type button
A security administrator has installed a new KDC for the corporate environment. Which of the following authentication protocols is the security administrator planning to implement across the organization?
A. LDAP B. RADIUS C. Kerberos D. XTACACS
You can use the compound ____ to combine two strings.
A. value separator B. equals comparison C. assignment operator D. declaration operator