____ are the specific instructions entered into a security system to regulate how it reacts to the data it receives.

A. Access control matrices
B. Capability rules
C. Configuration rules
D. Access control lists

Answer: C

Computer Science & Information Technology

You might also like to view...

Simple transitions and animations of the slides and content can bore the audience if too much is incorporated into the presentation

Indicate whether the statement is true or false

Computer Science & Information Technology

The keyboard shortcut to move one column to the right is ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology