1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vivado [14]
3 years ago
14

In Windows-based systems, a value that specifies the rights that are allowed or denied in an access control entry (ACE) of an ac

cess control list (ACL) is the definition of a(n) ________.
(A) process control system (PCS)
(B) domain administrator
(C) access mask discretionary
(D) access control list (DACL)
Computers and Technology
1 answer:
blsea [12.9K]3 years ago
4 0

Answer:

C. Access mask discretionary.

Explanation:

Access_Mask is the value that defines the rights used in access control entries (ACE), this value identifies if the trustee is allowed to access a secured object.

It can define rights in three categories: Standard, specific and generic rights.

You might be interested in
Choose all items that represent characteristics of HTML:
Leya [2.2K]
Markup language

used to write web pages

contains markup tags

determines how the text is displayed
4 0
4 years ago
Read 2 more answers
What should be a technicians first step in an A/C system
irina [24]

Perform a visual inspection

3 0
3 years ago
Dropdown Complete the sentence. To protect a web-based database, you should apply to any online forms that add data to it. princ
sergey [27]

To protect a web-based database, you should apply <u>principle of least privilege</u> to any online forms that add data to it.

<h3>What is principle of least privilege?</h3>

Principle of least privilege is also referred to as the principle of minimal privilege (least authority) and it can be defined as a security concept that involves giving an end user, software program, or process the minimum levels of access or permissions necessary to perform an action in a database.

In this context, a network administrator should apply the <u>principle </u><u>of least </u><u>privilege</u> to any online forms that add data to a web-based database, in order to protect it.

Read more on least privilege here: brainly.com/question/4365850

3 0
3 years ago
Read 2 more answers
Earthquakes with magnitudes between 1.0 and 2.9 on the Richter scale are
NeX [460]
They're not dangerous. However, they do cause mild tremors.
3 0
3 years ago
The layout of an envelope can be adjusted using the ____ tab
7nadin3 [17]
I think it’s the mailings tab
3 0
3 years ago
Other questions:
  • Lin is booting up his computer, and during the boot process, the computer powers down. After several unsuccessful attempts to bo
    10·1 answer
  • What are the role, responsibilities, and required background of the production designer of a film?
    6·1 answer
  • Write a C program that creates two threads to run the Fibonacci and the Runner processes. Threads will indicate the start and th
    14·1 answer
  • Which of the following is a typical concern for developers while using prototypes?
    6·2 answers
  • In statistics the mode of a set of values is the value that occurs most often. Write a program that determines how many pieces o
    10·1 answer
  • John, the Network Administrator of XYZ Corporation, is interested in changing the format of text from American Standard Code for
    12·1 answer
  • First person to answer gets free brainlist
    15·2 answers
  • What is the output of the code?
    15·1 answer
  • What is meant by a control plane that is based on logically centralized control? In such cases, are the data plane and the contr
    8·1 answer
  • Differentiate between Computer Science and Information Technology
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!