A systems administrator is configuring a new file server and has been instructed to configure writeable to by the department manager, and read only for the individual employee. Which of the following is the name for the access control methodology used?
A. Duty separation
B. Mandatory
C. Least privilege
D. Role-based
Answer: D. Role-based
You might also like to view...
Which of the following statements is true?
a. The code in a finally block is executed only if an exception occurs. b. The code in a finally block is executed only if an exception does not occur. c. The code in a finally block is executed only if there are no catch blocks. d. None of the above are true.
Which configuration changes would you need to apply to routers if you wanted to allow SMB/CIFS browsing across multiple subnets without configuring master browsers?
What will be an ideal response?
A ____ is one of the most basic units of storage within a database, typically representing unique and specific data objects.
A. table B. page C. buffer D. sheet
Referring to the figure above, to access this dialog box, you should click New Style on the ____ panel.
A. Manage Styles B. Apply Styles C. Format Styles D. Style Sheets