________ enables administrators to customize the system’s access control policy using loadable kernel modules.

a) Linux security modules (LSMs)
b) mandatory access control (MAC)
c) pluggable authentication modules (PAMs)
d) access control attributes

a) Linux security modules (LSMs)

Computer Science & Information Technology

You might also like to view...

How would you identify attributes from a user’s requirements specification and then associate the attributes with entity or relationship types?

What will be an ideal response?

Computer Science & Information Technology

Most switches enable you to use multiple NICs for a single machine, a process called __________ or link aggregation.

A. dispersion B. loopback C. bonding D. attenuation

Computer Science & Information Technology