What is the function of an access control list?

What will be an ideal response?

These lists identify which users and groups have object access and the respective permissions for that access.

Computer Science & Information Technology

You might also like to view...

A file with the .jpeg extension is a(n) ________ file

A) compressible image B) compressed file C) Adobe PDF D) Word document

Computer Science & Information Technology

The most common way for a virus to spread is by reading your email address book and emailing itself to your contacts

Indicate whether the statement is true or false.

Computer Science & Information Technology