Match each item with a statement below.

A. the process of identifying who has access to the network
B. the process of granting or denying an authenticated user's access to network resources
C. a text file that contains a list of commands
D. a property of a group that determines the reach of a group's application in a domain
E. an OS client component that intercepts resource requests
F. the Windows file sharing protocol
G. a type of group in Windows in which membership is controlled dynamically by Windows
H. a group scope that can contain users from any domain and be assigned permissions to resources in any domain
I. a group scope used mainly to group users from the same domain who have similar access and rights requirements
J. the native Linux/UNIX file sharing protocol

A. authentication
B. authorization
C. batch file
D. group scope
E. redirector
F. Server Message Block
G. special identity group
H. universal group
I. global group
J. Network File System

Computer Science & Information Technology

You might also like to view...

The Slide Master is a slide layout image that contains all of the placeholder formats for each layout within a theme

Indicate whether the statement is true or false

Computer Science & Information Technology

To change the vertical axis scale, you select the chart and click the Axes button in the:

A) Labels group on the Layout tab. B) Axes group on the Design tab. C) Labels group on the Design tab. D) Axes group on the Layout tab.

Computer Science & Information Technology