What are the two general approaches for controlling user authorization for the use of a technology?

A. profile lists and configuration tables
B. firewall rules and access filters
C. user profiles and filters
D. access control lists and capability tables

Answer: D

Computer Science & Information Technology

You might also like to view...

Although computers electronically process data, new advancements in ________ enable computers to learn processes and think for themselves

A) computer systems B) hardware C) artificial intelligence D) software

Computer Science & Information Technology

Which of the following is not that important when considering what printer will be used when printing a banner?

A) The amount of ink or toner that will be used to print the banner B) How close to the edges of the paper the printer can print C) Whether the printer can handle the large paper size often required for a banner D) Whether you have a printing service available if your printer will be able to print the banner

Computer Science & Information Technology