__________ access control controls access based on the identity of the requestor and on access rules stating what requestors are or are not allowed to do.
Fill in the blank(s) with the appropriate word(s).
Discretionary
Computer Science & Information Technology
You might also like to view...
A service set identifier is known as a(n) ________
A) VPN B) SAN C) SSID D) WPA2
Computer Science & Information Technology
Richard received a message from Matthew that was encrypted using an asymmetric cryptosystem. What key should Richard use to decrypt the message?
a. Matthew's public key b. Matthew's private key c. Richard's public key d. Richard's private key e. Shared secret key
Computer Science & Information Technology