Used to control how users enter data into a field in order to maintain consistency with data entry
a. Input Mask
b. Registered value
c. Format Mask
A
Computer Science & Information Technology
You might also like to view...
The ________ configuration creates a subinterface for each VLAN on the trunk and routes all frames associated with each VLAN ID as it comes in or out of the subinterface
A) MLS B) CEF C) ROAS D) Fast switching
Computer Science & Information Technology
Which of the following authentication services uses a default TCP port of 88?
A. Kerberos B. TACACS+ C. SAML D. LDAP
Computer Science & Information Technology