____ are the specific instructions entered into a security system to regulate how it reacts to the data it receives.

A. Access control matrices
B. Capability rules
C. Configuration rules
D. Access control lists


Answer: C

Computer Science & Information Technology

You might also like to view...

MC Two or more fields that form the primary key are referred to as the________primary key.

a) multiple. b) compound. c) duplicate. d) None of the above.

Computer Science & Information Technology

PowerPoint 2016 does not allow you to _________________________ text around a picture or other graphic.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A ________ chart is used to show comparison among related data

A) line B) pyramid C) column D) pie

Computer Science & Information Technology

A(n) _______ offers password protection and entertainment for today's computer users, but on older computers, it was used to prevent an image from burning into the screen

Fill in the blank(s) with correct word

Computer Science & Information Technology