Security-level rules enable you to set a default policy and create exceptions. You can select from the ________ security level, which allows software to run according to a user's access rights

a. Disallowed
b. Basic user
c. Power user
d. None of the above

D. This describes the unrestricted security level, which is the default.

Computer Science & Information Technology

You might also like to view...

Match the meanings to the following terms:

I. Combinations of text and numbers II. Lengthy text or combinations of text and numbers III. Numeric data used in mathematical calculations IV. An object in a Microsoft Access table created outside of Access V. Monetary values involving data with one to four decimal places VI. Sequential number assigned by Microsoft Access A. Currency B. OLE Object C. AutoNumber D. Number E. Short Text F. Long Text

Computer Science & Information Technology

A server administrator is notified that all three hard disks in a server array have failed. Which of the following is the MOST likely cause?

A. Incompatible BIOS B. Backplane failure C. Cache battery failure D. Incorrect firmware version

Computer Science & Information Technology