Which of the following controls can be implemented so an organization can configure multiple computers by setting a single policy for enforcement?

A. group-based access control
B. computer-based access control
C. role-based access control
D. system access control


Answer: A

Computer Science & Information Technology

You might also like to view...

Name six issues that should be considered when planning a home network.

What will be an ideal response?

Computer Science & Information Technology

The below question refer to the program segment. (Assume that all variables are of type int.)

``` z = 0; g = 0; s = 0; i = 0; while (i < 50) { cin >> t; s += t; if (t >= 0) g++; else z++; i++; } ``` The value stored in variable z at the end of the execution of the loop could best be described as the . a. number of positive items read b. sum of all positive items read c. number of negative items read d. sum of all negative items read e. sentinel value terminating the loop

Computer Science & Information Technology

To disallow a change to a document, you select the change and then press the ________ button

Fill in the blank(s) with correct word

Computer Science & Information Technology

The Package Presentation for CD can be saved to all of the following EXCEPT a ________

A) flash drive B) network drive C) local drive D) Word document

Computer Science & Information Technology