_________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.
A) Guard page
B) Access control
C) Firewall
D) All of the above
B) Access control
Computer Science & Information Technology
You might also like to view...
A ________ chart shows a proportion of parts to a whole
A) bar B) column C) line D) pie
Computer Science & Information Technology
When deleted text in a document shows in a different color with a line through it indicating it is marked for deletion and new text is in a different color and underlined, the document is being viewed in ________ mode
Fill in the blank(s) with correct word
Computer Science & Information Technology