Limiting access to information system resources only to authorized users, programs, processes, or other systems is called
A) Access control
B) User management
C) Installation
D) Configuration
Correct Answer:
Verified
Q9: The types of monitoring include
A) Penetration testing
Q10: The system administrator is the person responsible
Q11: Common system administration tasks include
A) Developing software
B)
Q12: UNIX was developed by
A) Ken Thompson and
Q13: A virtual machine
A) Is another name for
Q15: Active Directory
A) Encourages computer users to perform
Q16: The domain controller in Active Directory
A) Serves
Q17: System administration provides all of the following
Q18: Redundancy is
A) Availability of choices
B) Surplus capacity,
Q19: A hot spare is a
A) Single point
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents