With ____, authorization is implemented when you control permissions for new objects created in a container object by setting inheritable permissions on the container.

A. user-based authorization
B. permissions inheritance
C. discretionary access to securable objects
D. administrative privileges


Answer: B

Computer Science & Information Technology

You might also like to view...

What is the default view for the Computer window?

A) Thumbnails B) Tiles C) Large icons D) List

Computer Science & Information Technology

Which of the following is the International Electronics Commission working to make the universal connector standard for charging mobile devices?

A. FireWire B. micro USB C. MIDI D. serial

Computer Science & Information Technology

Each computer or device on a network is called a ____ .

A. server B. peer C. node D. client

Computer Science & Information Technology

Which of the following functions would not be used to write data randomly to a random access file?

a. tellg b. seekp c. write d. All of the above would be used.

Computer Science & Information Technology