With which access control method do system administrators establish what information users can share?
A. discretionary access control
B. mandatory access control
C. administrative access control
D. role-based access control
Answer: B
Computer Science & Information Technology
You might also like to view...
The ________ key is used to delete text to the left of the insertion point.
A. Delete B. Shift + Delete C. Backspace D. Shift + Backspace
Computer Science & Information Technology
The interface of the VoIP telephone system to the PSTN is called what?
What will be an ideal response?
Computer Science & Information Technology
Blogger is a Google communication platform for video calls, phone calls, or messages
Indicate whether the statement is true or false
Computer Science & Information Technology
Dropping a table also deletes any data that you entered into the table.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology