The file _____________ is used on web servers to control access to files and sub directories.


a. 401.html
b. .htaccess
c. php.ini
d. httpd.conf

b. .htaccess

Computer Science & Information Technology

You might also like to view...

Importing and exporting data can be prevented by hiding the ________ and Database Tools tabs

A) File B) Navigation Pane C) Create D) External Data

Computer Science & Information Technology

An information security analyst needs to work with an employee who can answer questions about how data for a specific system is used in the business. The analyst should seek out an employee who has the role of:

A. steward B. owner C. privacy officer D. systems administrator

Computer Science & Information Technology