Multiple Choice
The activation and use of access control lists is an example of the ____ process.
A) identification
B) accountability
C) authorization
D) authentication
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q24: Autocratic leaders usually _.<br>A) seek input from
Q25: Strategic planning _.<br>A) focuses on production planning<br>B)
Q26: Monitoring progress toward completion,and making necessary adjustments
Q27: Unlike ongoing operations,project management involves the short-term
Q28: _ are the operations conducted within InfoSec,which
Q30: Any project manager is better served using
Q31: _ is defined as the application of
Q32: _ are discrete sequences of activities with
Q33: Audit logs that track user activity on
Q34: Communications security involves the protection of an