___________ is a security mechanism where a user can gain access only to a resource if the security or system administrator grants the access

a. Role-based access control
b. Mandatory access control
c. Discretionary access control
d. Break the glass access


B.

Computer Science & Information Technology

You might also like to view...

A ________ can be used to block unauthorized access to a network

A) filter B) firewall C) hub D) switch

Computer Science & Information Technology

Searching a website to help you find just the right product involves database technology

Indicate whether the statement is true or false

Computer Science & Information Technology

Which multicast reserved address is designed to reach solicited-node addresses?

A. FF02::0:XXXX:XXXX B. FF02::1:FFXX C. FF01::2:FFXX:XXXX D. FF02::1:FFXX:XXXX

Computer Science & Information Technology

You can use a special value to represent situations in which an actual value is unknown, unavailable, or not applicable. This special value is called a(n) ____________________ data value.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology