1.

Which of the following security technique that regulates who canuse resources in a computing environment?(a) Password(b) Authentication (c) Access control(d) Certification

Answer»

(c) Access contro



Discussion

No Comment Found