Multiple Choice
The action that is taken by the subject over the object is called a(n) ____.
A) authorization
B) access
C) control
D) operation
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q3: Describe LDAP injection attacks.
Q5: In the DAC model, _ can create
Q10: Match each term with the correct statement
Q12: _ is often used for managing user
Q12: Discuss the two significant weaknesses of DAC.
Q13: In the UAC dialog boxes, the color
Q16: Entries in the DIB are arranged in
Q17: A(n) _ model is a standard that
Q25: A user or a process functioning on
Q47: Describe the two key elements of the