Saved Bookmarks
| 1. |
Which of the following security technique that regulates who canuse resources in a computing environment?(a) Password(b) Authentication (c) Access control(d) Certification |
|
Answer» (c) Access contro |
|