Multiple Choice
With ____, authorization is implemented by allowing the administrator to control which users or groups have the right to perform various administrative functions or to take any action that affects systemwide resources.
A) administrative privileges
B) permissions inheritance
C) user-based authorization
D) discretionary access to securable objects
Correct Answer:

Verified
Correct Answer:
Verified
Q8: What are the general steps performed when
Q9: Java 2 provides access controls based on
Q10: _ is concerned with what an identity
Q11: The JAAS framework defines the term _
Q12: A good authentication technology should be platform
Q14: Briefly describe authorization.
Q15: Does a "good" authentication technology that is
Q16: Briefly describe the Refreshable interface.
Q17: _ is a list attached to an
Q18: The _ PAM module prompts for a