Confidential Services Inc. is a military-support branch consisting of 1,400 computers with Internet access and 250 servers. All employees are required to have security clearances. From the options listed below, what access control model would be most appropriate for this organization?

A. Discretionary access control
B. Role-based access control
C. Attribute-based access control
D. Mandatory access control


Answer: D. Mandatory access control

Computer Science & Information Technology

You might also like to view...

Which of the following represents the efficiency of the insertion sort?

a. O(1) b. O(n) d. None of the above.

Computer Science & Information Technology

List under what circumstances a socket.error exception is raised.

What will be an ideal response?

Computer Science & Information Technology

How is motion detection technology used to monitor and provide security for sensitive areas, and how can it deal with false positives?

What will be an ideal response?

Computer Science & Information Technology

To check a program for syntax errors, you use a program called the Java ____.

A. translator B. compiler C. interpreter D. editor

Computer Science & Information Technology