An organization is trying to decide which type of access control is most appropriate for the network. The current access control approach is too complex and requires significant overhead.Management would like to simplify the access control and provide user with the ability to determine what permissions should be applied to files, document, and directories. The access control method that BEST satisfies these objectives is:
A. Rule-based access control
B. Role-based access control
C. Mandatory access control
D. Discretionary access control
Answer: D. Discretionary access control
Computer Science & Information Technology
You might also like to view...
The body of each class declaration begins with ________ and ends with ________.
e. (, ). f. [, ]. g. {, }. h. /, \.
Computer Science & Information Technology
Which of the following code examples follows the correct syntax to specify that text display in blue?
A) "style=color:blue" B) style="color:blue" C) style=color:blue D) style:color="blue"
Computer Science & Information Technology
________ supports the viewing, editing, and printing of presentations from within a web browser
Fill in the blank(s) with correct word
Computer Science & Information Technology
Describe how authentication is different in a home network from a corporate network
What will be an ideal response?
Computer Science & Information Technology