Multiple Choice
____ allows administrators to control what users can do after they are logged on to the network.
A) Authentication
B) Authorization
C) Logging
D) Penetration testing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q6: Spam is simply unsolicited e-mail.
Q7: On Linux systems, a simple method to
Q8: What are the rules or guidelines for
Q9: IPSec works by establishing a(n)_ between two
Q10: Match each term with the correct statement
Q12: A _ is a program installed on
Q13: What is a hoax virus?
Q14: A hardware firewall is configured with two
Q15: Viruses, worms, and rootkits are part of
Q16: _ are a form of Trojan programs