Confidential Services Inc. is a military-support branch consisting of 1,400 computers with Internet access and 250 servers. All employees are required to have security clearances. From the options listed below, what access control model would be most appropriate for this organization?
A. Discretionary access control
B. Role-based access control
C. Attribute-based access control
D. Mandatory access control
Answer: D. Mandatory access control
Computer Science & Information Technology
You might also like to view...
Which of the following represents the efficiency of the insertion sort?
a. O(1) b. O(n) d. None of the above.
Computer Science & Information Technology
List under what circumstances a socket.error exception is raised.
What will be an ideal response?
Computer Science & Information Technology
How is motion detection technology used to monitor and provide security for sensitive areas, and how can it deal with false positives?
What will be an ideal response?
Computer Science & Information Technology
To check a program for syntax errors, you use a program called the Java ____.
A. translator B. compiler C. interpreter D. editor
Computer Science & Information Technology