What specific name is given to describe a security policy based on access control lists?
A. Network Security Group
B. Access Control List
C. Security Priority Group
D. Secure Access List
Answer: A
Computer Science & Information Technology
You might also like to view...
The & operator can be applied to
a) constants b) variables defined with the storage class register c) variables defined with the storage class static d) rvalues
Computer Science & Information Technology
What would be the output of the following statement?
printf( "%4d", 123456 ); a) 1234 b) 2345 c) 3456 d) none of these
Computer Science & Information Technology