Jane, a security administrator, has applied security labels to files and folders to manage and restrict access. Which of the following is Jane using?

A. Mandatory access control
B. Role based access control
C. Implicit access control
D. Discretionary access control


Answer: A. Mandatory access control

Computer Science & Information Technology

You might also like to view...

Each thread in a process is represented by a data structure called a ____ that contains basic information such as the thread's unique identification, state, and priority.

A. Thread Control Block B. Thread State Block C. Thread Pointer D. Thread Queue

Computer Science & Information Technology

The Chief Information Officer (CIO) has noticed the corporate wireless signal is available in the parking lot. Management requests that the wireless network be changed so it is no longer accessible in public areas, without affecting the availability inside the building. Which of the following should be changed on the network?

A. Power levels B. Overcapacity C. Distance limitations D. Channel overlap

Computer Science & Information Technology

If a workbook contains multiple worksheets that contain either an identical structure or data with identical row and column labels, a user can create a summary worksheet using the ________ feature

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is an example of a newsfeed using pull technology?

A. ?Google Chat B. ?Facebook C. ?Twitter D. ?Usenet

Computer Science & Information Technology