Jane, a security administrator, has applied security labels to files and folders to manage and restrict access. Which of the following is Jane using?
A. Mandatory access control
B. Role based access control
C. Implicit access control
D. Discretionary access control
Answer: A. Mandatory access control
You might also like to view...
Each thread in a process is represented by a data structure called a ____ that contains basic information such as the thread's unique identification, state, and priority.
A. Thread Control Block B. Thread State Block C. Thread Pointer D. Thread Queue
The Chief Information Officer (CIO) has noticed the corporate wireless signal is available in the parking lot. Management requests that the wireless network be changed so it is no longer accessible in public areas, without affecting the availability inside the building. Which of the following should be changed on the network?
A. Power levels B. Overcapacity C. Distance limitations D. Channel overlap
If a workbook contains multiple worksheets that contain either an identical structure or data with identical row and column labels, a user can create a summary worksheet using the ________ feature
Fill in the blank(s) with the appropriate word(s).
Which of the following is an example of a newsfeed using pull technology?
A. ?Google Chat B. ?Facebook C. ?Twitter D. ?Usenet