What type of model is identity-based access control?

a. Mandatory access control
b. Discretionary access control
c. Nondiscretionary access control
d. Transitive-discretionary access control


Answer: b. Discretionary access control

Computer Science & Information Technology

You might also like to view...

A risk manager requires that his organization implement a control to prevent application attacks. The best solution is to use:

a. Multi-tier architecture b. Code reviews c. An application vulnerability scanner d. An application firewall

Computer Science & Information Technology

Answer the following questions true (T) or false (F)

1. True/False: It is impossible to store the fraction 0.5 in 6 bits as a binary number because 0.510 = 0.12. 2. True/False: To store the binary number 101012in an 8-bit location, simply add three zeros to get 101010002 . 3. True/False: A number system that uses 19 as a base would be impossible to create because the highest possible number system is 16 .

Computer Science & Information Technology

Most tables include a(n) ____ that describes the data in the table.

A. data descriptor B. title C. list D. caption

Computer Science & Information Technology

The arrest team has the responsibility of arresting suspects and ________

a. interrogating them b. transporting them in custody c. physically searching them for evidence d. seizing their belongings

Computer Science & Information Technology