Advertisements
Advertisements
Question
Which of the following security technique that regulates who can use resources in a computing environment?
Options
Password
Authentication
Access control
Certification
MCQ
Solution
Access control
shaalaa.com
Introduction to Scoping
Is there an error in this question or solution?