Match each item with a statement below.
A. the process of identifying who has access to the network
B. the process of granting or denying an authenticated user's access to network resources
C. a text file that contains a list of commands
D. a property of a group that determines the reach of a group's application in a domain
E. an OS client component that intercepts resource requests
F. the Windows file sharing protocol
G. a type of group in Windows in which membership is controlled dynamically by Windows
H. a group scope that can contain users from any domain and be assigned permissions to resources in any domain
I. a group scope used mainly to group users from the same domain who have similar access and rights requirements
J. the native Linux/UNIX file sharing protocol
A. authentication
B. authorization
C. batch file
D. group scope
E. redirector
F. Server Message Block
G. special identity group
H. universal group
I. global group
J. Network File System
You might also like to view...
The __________ access modifier allows other classes to call a method.
a) public b) private c) default d) None of the above.
Case-Based Critical Thinking QuestionsCase 2-1Abby has selected fonts in the past for her Web sites without knowing much about them, so she has resolved to learning more about them so that she can make even more informed choices in the future. Which of the following does Abby learn is a generic font family?
A. Arial B. Courier C. Mono D. all of the above
By default, a custom table style is available in the current document only
Indicate whether the statement is true or false
How can results from a specified static lookup file be displayed?
A. lookup command B. inputlookup command C. Settings > Lookups > Input D. Settings > Lookups > Upload