In computer security, an access control list (ACL) is a list of permissions attached to an object.
Which log will reveal activities about ACL?
A.
Performance
B.
Mobile device
C.
Firewall
D.
Transaction
In computer security, an access control list (ACL) is a list of permissions attached to an object.
Which log will reveal activities about ACL?
In computer security, an access control list (ACL) is a list of permissions attached to an object.
Which log will reveal activities about ACL?
A.
Performance
B.
Mobile device
C.
Firewall
D.
Transaction