__________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.
A. Audit control B. Resource control
C. System control D. Access control
D. Access control
Computer Science & Information Technology
You might also like to view...
Excel stores dates and times as a ________
A) fraction B) roman numeral C) decimal fraction D) single number
Computer Science & Information Technology
A ____, popularly called a digital modem, links a computer or a fax to an ISDN line.
A. terminal station B. terminal adapter C. terminal connector D. premises adapter
Computer Science & Information Technology