Which of the following controls can be implemented so an organization can configure multiple computers by setting a single policy for enforcement?
A. group-based access control
B. computer-based access control
C. role-based access control
D. system access control
Answer: A
You might also like to view...
Name six issues that should be considered when planning a home network.
What will be an ideal response?
The below question refer to the program segment. (Assume that all variables are of type int.)
``` z = 0; g = 0; s = 0; i = 0; while (i < 50) { cin >> t; s += t; if (t >= 0) g++; else z++; i++; } ``` The value stored in variable z at the end of the execution of the loop could best be described as the . a. number of positive items read b. sum of all positive items read c. number of negative items read d. sum of all negative items read e. sentinel value terminating the loop
To disallow a change to a document, you select the change and then press the ________ button
Fill in the blank(s) with correct word
The Package Presentation for CD can be saved to all of the following EXCEPT a ________
A) flash drive B) network drive C) local drive D) Word document