COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Phishing
|
|
Permissions
|
|
Encryption
|
|
None of the above
|
Detailed explanation-1: -Permissions define the type of access that is granted to a user or group for an object or object property.
Detailed explanation-2: -Control access rights provide a way for a single ACE to control access to a set of attributes. For example, the user class supports the Personal-Information property set that includes attributes such as street address and telephone number.
Detailed explanation-3: -Access Rights are the permissions an individual user or a computer application holds to read, write, modify, delete or otherwise access a computer file; change configurations or settings, or add or remove applications.
Detailed explanation-4: -Access permissions determine a user’s ability to perform a specific action, or access a feature or object. Setting permissions for content. Set access permissions to specify which users, groups, or roles can access your content.