COMPUTER SOFTWARE
SYSTEM SOFTWARE
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Identifying which are users are on the network
|
|
Creating a default log-off time for all users
|
|
Monitor network usage by each user
|
|
Create or change access rights for an individual user
|
Detailed explanation-1: -The most common permissions are read, write, delete, and execute. Read allows a user to open and read a file or directory. Write allows a user to open the file or directory, make changes, and save those changes. Delete allows a user to delete the file or directory.
Detailed explanation-2: -User authentication. The operating system must identify each user who requests access and must ascertain that the user is actually who he or she purports to be. The most common authentication mechanism is password comparison.
Detailed explanation-3: -Performing regular OS patch updates. Installing updated antivirus engines and software. Scrutinizing all incoming and outgoing network traffic through a firewall. Creating secure accounts with required privileges only (i.e., user management) 06-Jul-2022
Detailed explanation-4: -Discretionary access control (DAC) Mandatory access control (MAC) Role-based access control (RBAC) Rule-based access control (RuBAC)