answersLogoWhite

0

C. Share level access

D. User level access

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

What security scenario is more restrictive to a user?

user level security


What allows for applications to keep track of a user's security credentials user ID and password for one or more security systems?

Windows CardSpace


What spreadsheet feature allows the user to see how changing one or more numbers changes the outcome of calculations?

Scenario


What are domain-wide controls that specify password requirements account lockout settings auditing user rights security options and more?

Security policies


What is the difference between share-level and user-level security?

Share-level and User-level security is actually in the category of computers. In share-Level security systems, passwords are associated with specific objects, not with users. ex. Windows XP User-Level security is the most flexible and secure method of protecting the sensitive data, code, and design of objects in an Access database. User-Level security is for if you need more control. ex. To prevent users from modifying the design of your tables and queries.


Are Linksys modems any more secure than Belkin?

The major security issue with routers is the user rather than the Hardware.There is no real difference in their security,but the user has to take the responsibility to secure his own network.Usually the simplest steps suffice.


What is a reason for disabling simple file sharing?

It enables the user to set more specific security access levels.


What benefit does 802.1x provide to a wireless network?

It provides more security and allows for a more diversified user base. See the related link for more details.


Whst does SID do in xp?

SID is the security identifier is a unique identifier of a user, user group, or other security principal on Windows XP


What is a scenario in ict?

A scenario in ICT (Information and Communication Technology) refers to a specific situation or context in which technology is used to solve problems or enhance processes. For example, a scenario might involve a company implementing a new cloud-based communication system to improve collaboration among remote teams. In this context, the scenario would explore the challenges, benefits, and outcomes of adopting the technology, including factors such as user training and data security. Scenarios help stakeholders visualize potential impacts and make informed decisions about technology adoption.


What is the security key to Clash of Clans hack tool 1.2v?

The security key to Clash of Clans Hack Tool 1.2V is Single User. To get the security key you need to upgrade to a premium user.


Which gives better security workgroup sharing or homegroup sharing?

A workgroup has more security. A homegroup provides less security than a workgroup because any user of any computer in the homegroup can access homegroup resources.