Multiple Choice
A list that specifies which subjects are allowed to access an object and what operations they can perform on it is referred to as a(n) :
A) ACE
B) DAC
C) entity
D) ACL
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q3: Describe LDAP injection attacks.
Q4: What is the purpose of an ACL?
Q5: Discuss the differences between DAP and LDAP.
Q6: With the Discretionary Access Control (DAC)model,no object
Q7: Which access control model that uses access
Q9: The action that is taken by a
Q10: Authentication,authorization,and accounting are sometimes called AAA.
Q11: Although designed to support remote dial-in access
Q12: Discuss the two significant weaknesses of DAC.
Q13: What kind of attack allows for the