Ann has read and write access to an employee database, while Joe has only read access. Ann is leaving for a conference. Which of the following types of authorization could be utilized to trigger write access for Joe when Ann is absent?
A. Mandatory access control
B. Role-based access control
C. Discretionary access control
D. Rule-based access control
Answer: D. Rule-based access control
Computer Science & Information Technology
You might also like to view...
What's the function of the { } metacharacters?
What will be an ideal response?
Computer Science & Information Technology
The item marked 8 in the figure above is the ____ button.
A. 25% Complete B. 25% Left C. 25% Free Slack D. None of the above
Computer Science & Information Technology
With the original evidence safely stored, you should make a(n) ________ of the forensic image
Fill in the blank(s) with correct word
Computer Science & Information Technology
Since a page designer doesn't know the exact properties of a user's device, the common practice is to make the text _________ with all font sizes expressed relative to a default font size.?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology