Role-based access control is BEST defined as an authorization system by which:

A. Privileges are granted to persons based on membership in one or more functional groups.
B. A separate user account is created for each functional role a person has.
C. Access is limited to the time of day a person is expected to work.
D. Privileges are assigned to each person based upon authorized requests.


Answer: A. Privileges are granted to persons based on membership in one or more functional groups.

Computer Science & Information Technology

You might also like to view...

To rename a worksheet using the mouse method, double-click a sheet tab, type a new worksheet name, then press [Enter].

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is the heart of animation in the Adobe Flash program?

A. The Timeline B. The Library C. The Keyframe D. Code Snippets

Computer Science & Information Technology

The area of a room is , and its perimeter is . Let x be the width and let y be the length of the room.Write a system of equations that models this situation.Enter the equation for the area. __________Enter the equation for the perimeter . __________Determine the length and the width of the room.  _____ ft by _____ ft

What will be an ideal response?

Computer Science & Information Technology

Another important issue: Security! Jesse wants my thoughts on how SCR should manage IT security. She wants me to consider all six levels, and prepare an outline for a corporate security policy.

What will be an ideal response?

Computer Science & Information Technology