Individual permissions can be set using the ____ program without any programming.

A. policytool
B. securityManager
C. gc
D. policy


Answer: A

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 1-1Sonya had just finished making all the assignments to the various project teams when her hard drive crashed and she lost all of the data.Sonya herself was to have been responsible for identifying the project budget. Which group was she to have been assigned to?

A. initiating B. planning C. controlling D. executing

Computer Science & Information Technology

____ was one of the first languages to have an integrated development environment (IDE).

A. Visual Basic B. FORTRAN C. LISP D. COBOL

Computer Science & Information Technology

The server role responsible for name resolution for the internal network as well as Internet resources is ______

a. DHCP b. DNS c. WINS d. Fax

Computer Science & Information Technology

A SAN is a high-speed network with the sole purpose of providing storage to other attached ______.

A. storage devices B. servers C. security systems D. smart devices

Computer Science & Information Technology