Derek’s supervisor is concerned that the company’s security system does not comply with the new standards the company has decided to employ. She has asked Derek to determine how members of the company are authenticated on the network. 
 
What does the computer or server use to verify the access to a specific resource on the network?

A. Access control list
B. Directory permissions
C. Login script
D. Digital Certificate


Answer: A

Computer Science & Information Technology

You might also like to view...

What is the role of comments in an HTML document? Describe the correct syntax to use to add a comment to an HTML document.

What will be an ideal response?

Computer Science & Information Technology

The ____ of the wireless network is the area the radio signal reaches.

A. basic service area B. usage pattern C. footprint D. spectrum

Computer Science & Information Technology

A(n) ____ is a collection of connected Web pages that contain text, images, or video.

A. Internet site B. Web file C. Web folder D. Web site

Computer Science & Information Technology

Which of the following will occur when a switch encounters an unknown destination unicast frame?

A) The switch will flood the frame. B) The switch will determine if the incoming frame has a known source. C) The switch will filter the frame. D) The switch will add the destination to its address table.

Computer Science & Information Technology