New employees of Baker Technologies are assigned user names and appropriate permissions. Their credentials are then entered into the company's information system's access control matrix. This is an example of a(n)

A) authentication control.
B) biometric device.
C) remote access control.
D) authorization control.

Answer: D

Business

You might also like to view...

Use the information in Table 13.4. What is the center of gravity?

A) x < 7, y < 8 B) x > 7, y < 8 C) x < 7, y > 8 D) x > 7, y > 8

Business

Managers should not be concerned with business ethics because ethical behavior is inconsistent

with the primary goal of maximizing shareholder value. Indicate whether the statement is true or false

Business