A(n) _________ is a formal access control methodology used to assign a level of
confidentiality to an information asset and thus restrict the number of people who can access it.
A. security clearance scheme
B. data recovery scheme
C. risk management scheme
D. data classification scheme
Answer: D
Computer Science & Information Technology
You might also like to view...
It is helpful to sketch a form or report before creating these objects in Access
Indicate whether the statement is true or false
Computer Science & Information Technology
You can apply 3D properties to ____ instances.
A. graphic B. text C. movie clip D. all of the above
Computer Science & Information Technology