What specific name is given to describe a security policy based on access control lists?

A. Network Security Group
B. Access Control List
C. Security Priority Group
D. Secure Access List

Answer: A

Computer Science & Information Technology

You might also like to view...

The & operator can be applied to

a) constants b) variables defined with the storage class register c) variables defined with the storage class static d) rvalues

Computer Science & Information Technology

What would be the output of the following statement?

printf( "%4d", 123456 ); a) 1234 b) 2345 c) 3456 d) none of these

Computer Science & Information Technology