1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
3 years ago
8

You are the administrator of a Windows network. When creating a new user account, you specify a security clearance level of top

secret so that the user can access classified files. What type of access control method is being used?
Computers and Technology
1 answer:
dezoksy [38]3 years ago
4 0

Answer:

MAC (Mandatory access control)

Explanation:

Mandatory access control is a type of access control.MAC is a strategy that are defined by system administration. MAC access is controlled by administration.  Administrative security access training, security awareness , written policies and procedures, incident response plan , agreements and background checks.                        

You might be interested in
Explain how the use of Git and a shared public Git repository simplifies the process of managing opensource development when man
GrogVix [38]

Answer:

Git is a collaborative software used by members of a group to share and work on the same projects. Github is a web application that uses git to link people working together on a codebase. With git and Github, opensource projects can be accessed and collaborated on by volunteers.

Explanation:

Opensource development is a collaborative group of developers working together on a software or platform with a general public license. When working on an opensource project, each developer is able to folk or get a copy of the repository downloaded to a local computer which they can work on and push or update to the actual online repository if the condition for a change is met.

4 0
3 years ago
What is contrast (in Photography)?
kozerog [31]

Answer:

Contrast is a tool that photographers use to direct viewers' attention to their subject. There are two types: Tonal Contrast and Color Contrast. TC refers to the difference in tones from the lightest tone to the darkest tone, in other words, the difference in tones from white to gray to black.

Explanation:

heheh there you go

3 0
3 years ago
Explain the steps in starting the MS Access from the Start Menu.​
blondinia [14]

Explanation:

<em>As</em><em> </em><em>with</em><em> </em><em>most</em><em> </em><em>windows</em><em> </em><em>programs</em><em> </em><em>Access</em><em> </em><em>can</em><em> </em><em>be</em><em> </em><em>executed</em><em> </em><em>by</em><em> </em><em>navigation</em><em> </em><em>the</em><em> </em><em>start</em><em> </em><em>menu</em><em> </em><em>in</em><em> </em><em>the</em><em> </em><em>lower</em><em> </em><em>left</em><em> </em><em>hand</em><em> </em><em>corner</em><em> </em><em>of</em><em> </em><em>the</em><em> </em><em>windows</em><em> </em><em>desktop</em><em>. </em><em>To</em><em> </em><em> </em><em>Acess</em><em>,</em><em> </em><em>click</em><em> </em><em>on</em><em> </em><em>the</em><em> </em><em>start</em><em> </em><em>button</em><em>,</em><em> </em><em>then</em><em> </em><em>the</em><em> </em><em>programs</em><em> </em><em>menu</em><em> </em><em>then</em><em> </em><em>move</em><em> </em><em>to</em><em> </em><em>the</em><em> </em><em>Microsoft</em><em> </em><em>Office</em><em> </em><em>m</em><em>enu</em><em> </em><em>a.d</em><em> </em><em>finally</em><em> </em><em>click</em><em> </em><em>on</em><em> </em><em>the</em><em> </em><em>Microsoft</em><em> </em><em>Access</em><em> </em><em>menu</em><em> </em><em>item</em><em>. </em>

6 0
3 years ago
A _____ attack floods a network or server with service requests to prevent legitimate users' access to the system. phishing back
Ad libitum [116K]
Denial-of-service is correct 
4 0
3 years ago
What lets you do many things, like write book reports and stories?
Marina CMI [18]
A -
Application programs
8 0
3 years ago
Read 2 more answers
Other questions:
  • In hunter-gather societies most hunting was done by
    9·2 answers
  • Which string method counts the number of characters in a string?
    5·1 answer
  • Adam discovers a virus on his system that is using encryption to modify itself. the virus escapes detection by signature-based a
    14·1 answer
  • Radiation requires a heated liquid to transfer energy. Please select the best answer from the choices provided T F
    10·2 answers
  • Most students overestimate their skill level and abilities to take open book tests.
    11·2 answers
  • Help me plase will give brainliest
    12·2 answers
  • Which of the following does not use a Graphic User Interface?
    14·1 answer
  • Fill in the blank: _________ is Google’s machine-learning artificial intelligence system that interprets people’s searches to fi
    9·1 answer
  • Can someone start me off with a short 2 or 3 paragraphs about the pros and cons of Microsoft Word, and if you can recommend a si
    12·1 answer
  • A user complains that the pointer movement on his laptop computer is very erratic what should you do?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!