Which of the following access control policies is based on sets of permissions involved in an operation?
A. DAC
B. RBAC
C. MAC
D. Rule-based access control
B. RBAC (role-based access control) is based on sets of permissions involved in an operation; it is based on roles.
You might also like to view...
Preformatted text is displayed by the browser in a ____ in which each letter takes up the same amount of space.
A. monospace text box B. monospace font C. cell spacing text box D. cell spacing font
Create a spreadsheet for apartment costs based on the number of bedrooms, the number of roommates, and standard living expenses. Plot various scenarios depending on the price, number of roommates, and monthly expenses.
What will be an ideal response?
Case 5-2Nico is writing a program that combines sound files.Nico wants to add a(n) ____, an effect wherein an earlier part of a sound clip is heard concurrently with the sound at the present moment.
A. splice B. echo C. compose D. blur
The memory hierarchy design principle that dictates that all information items are originally stored in level Mn, where n is the level most remote from the processor is ___________ .
Fill in the blank(s) with the appropriate word(s).