____ are the specific instructions entered into a security system to regulate how it reacts to the data it receives.
A. Access control matrices
B. Capability rules
C. Configuration rules
D. Access control lists
Answer: C
Computer Science & Information Technology
You might also like to view...
Simple transitions and animations of the slides and content can bore the audience if too much is incorporated into the presentation
Indicate whether the statement is true or false
Computer Science & Information Technology
The keyboard shortcut to move one column to the right is ________
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology