Ann has read and write access to an employee database, while Joe has only read access. Ann is leaving for a conference. Which of the following types of authorization could be utilized to trigger write access for Joe when Ann is absent?

A. Mandatory access control
B. Role-based access control
C. Discretionary access control
D. Rule-based access control


Answer: D. Rule-based access control

Computer Science & Information Technology

You might also like to view...

What's the function of the { } metacharacters?

What will be an ideal response?

Computer Science & Information Technology

The item marked 8 in the figure above is the ____ button.

A. 25% Complete B. 25% Left C. 25% Free Slack D. None of the above

Computer Science & Information Technology

With the original evidence safely stored, you should make a(n) ________ of the forensic image

Fill in the blank(s) with correct word

Computer Science & Information Technology

Since a page designer doesn't know the exact properties of a user's device, the common practice is to make the text _________ with all font sizes expressed relative to a default font size.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology