In the ____ access control, the user can adjust the permissions for other users over network devices.

A. mandatory
B. discretionary
C. role based
D. temporal


Answer: B

Computer Science & Information Technology

You might also like to view...

A file stream, fStr, is open and attached to physical file.txt. To reset this file stream so that the file can be read again starting at the first line requires

a) “File stream fStr, reset yourself to the start of the file.” b) Calling the reset() member function using fStr as the calling object but with no argument. c) With calling object fStr call close()then call open( ) with argument “fStr”. d) Only calling the member function open() using fStr as the calling object with the “file.txt” as argument. e) None of the above. You can’t reread lines of a file that have already been read.

Computer Science & Information Technology

Many password recovery tools have a feature for generating potential password lists for which type of attack?

a. Brute-force b. Password dictionary c. Birthday d. Salting

Computer Science & Information Technology

Briefly describe a network.

What will be an ideal response?

Computer Science & Information Technology

A user reports that they keep getting disconnected on the wireless network. After further investigation, the technician confirms that this occurs only in that user's office. Which of the following would MOST likely cause them to lose their connection?

A. Encryption type B. Disabled wireless adapter C. SSID mismatch D. Interference

Computer Science & Information Technology