Which of the following presents the STRONGEST access control?
A. MAC
B. TACACS
C. DAC
D. RBAC
Answer: A. MAC
You might also like to view...
Every node in a binary tree can have pointers to
A) its left and right child. B) its left and right parent. C) binary nodes. D) its end nodes. E) None of the above
Which of the following statements is false?
a. You cannot prevent client code from creating objects of a class. b. One common use of a private constructor is sharing initialization code among a class’s other constructors. c. Another common use of private constructors is to force client code to use so-called “factory methods” to create objects. d. A factory method is a public static method that creates and initializes an object of a specified type (possibly of the same class), then returns a reference to it.
In the formula, =1+(2-3)+5/6-6^2, what will Excel evaluate first?
A. 5/6 B. 1+ C. (2-3) D. 6^2
According to the C.I.A. triad, which of the following is the most desirable characteristic for privacy?
A. confidentiality B. availability C. integrity D. accountability