Identification and authentication is part of the _______ class of security controls.

A. technical B. operational
C. management D. none of the above


A. technical

Computer Science & Information Technology

You might also like to view...

With fast user switching, only one user can be actively using the computer at a time.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To create a tool tip, when you hover your mouse over a page element, you place a _______________ attribute inside a tag.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The OS/JCL DD statement VOLUME (or VOL) parameter specifies a particular disk volume (or pack). 2. The OS/JCL DD statement DISP (disposition) parameter tells the system what to do with a disk file after the job step is completed. 3. On an OS/JCL DD statement DISP (disposition) parameter, the third DISP sub-parameter defines the file’s disposition following abnormal job termination. 4. The programmer must code the appropriate parameters to access the standard system input and output devices. 5. Sometimes, two or more DD statements, each in a different job step but still within the same job, are assigned the same DDNAME.

Computer Science & Information Technology

Which table style option shows the field names when it is checked?

A) Header Row B) First Column C) Total Row D) Banded Columns

Computer Science & Information Technology