In the ____ access control, the user can adjust the permissions for other users over network devices.
A. mandatory
B. discretionary
C. role based
D. temporal
Answer: B
You might also like to view...
A file stream, fStr, is open and attached to physical file.txt. To reset this file stream so that the file can be read again starting at the first line requires
a) “File stream fStr, reset yourself to the start of the file.” b) Calling the reset() member function using fStr as the calling object but with no argument. c) With calling object fStr call close()then call open( ) with argument “fStr”. d) Only calling the member function open() using fStr as the calling object with the “file.txt” as argument. e) None of the above. You can’t reread lines of a file that have already been read.
Many password recovery tools have a feature for generating potential password lists for which type of attack?
a. Brute-force b. Password dictionary c. Birthday d. Salting
Briefly describe a network.
What will be an ideal response?
A user reports that they keep getting disconnected on the wireless network. After further investigation, the technician confirms that this occurs only in that user's office. Which of the following would MOST likely cause them to lose their connection?
A. Encryption type B. Disabled wireless adapter C. SSID mismatch D. Interference