What type of model is identity-based access control?
a. Mandatory access control
b. Discretionary access control
c. Nondiscretionary access control
d. Transitive-discretionary access control
Answer: b. Discretionary access control
You might also like to view...
A risk manager requires that his organization implement a control to prevent application attacks. The best solution is to use:
a. Multi-tier architecture b. Code reviews c. An application vulnerability scanner d. An application firewall
Answer the following questions true (T) or false (F)
1. True/False: It is impossible to store the fraction 0.5 in 6 bits as a binary number because 0.510 = 0.12. 2. True/False: To store the binary number 101012in an 8-bit location, simply add three zeros to get 101010002 . 3. True/False: A number system that uses 19 as a base would be impossible to create because the highest possible number system is 16 .
Most tables include a(n) ____ that describes the data in the table.
A. data descriptor B. title C. list D. caption
The arrest team has the responsibility of arresting suspects and ________
a. interrogating them b. transporting them in custody c. physically searching them for evidence d. seizing their belongings