What is the function of an access control list?
What will be an ideal response?
These lists identify which users and groups have object access and the respective permissions for that access.
Computer Science & Information Technology
You might also like to view...
A file with the .jpeg extension is a(n) ________ file
A) compressible image B) compressed file C) Adobe PDF D) Word document
Computer Science & Information Technology
The most common way for a virus to spread is by reading your email address book and emailing itself to your contacts
Indicate whether the statement is true or false.
Computer Science & Information Technology