Controlling and maintaining resources from one central location.
change management
Rules that control how changes to an infrastructure are allowed to occur.
change policy
The rules that are enforced for change management.
class options
DHCP client configuration options that are applied to systems based upon vendor- or user -supplied configurations.
coerced administrators
Administrators who are forced by an outside entity to perform an attack upon network resources.
collaborative model
Sharing administrative responsibilities within a domain, tree, or forest.
complex passwords
Passwords that use a combination of character types and are not words. When enforced, the password has to contain at least three of the following four character types; uppercase character, lowercase character, numeral, and special character.
connection types
The wide area link types that are available for an organization to use in order to connect their locations.
corporate standards
The policies that control user environments so that the company s rules and regulations are enforced.
cost center model
Business model that allows departments to charge one another for use of their resources.
cryptographic export laws
Laws that govern what level of encryption can be transferred to other countries .