In a ____ system, the subject's access permissions are assigned based on the security attributes that they possess and the rules that have been established for those attributes.

A. mandatory access control
B. role-based access control
C. discretionary access control
D. delegated access control


Answer: A

Computer Science & Information Technology

You might also like to view...

Create the ability to go down from the Porch, to explore a secret underground world.

What will be an ideal response?

Computer Science & Information Technology

Which chart type would best show sales trends by connecting several points over time?

A. Column B. Bar C. Line D. Area

Computer Science & Information Technology

If an array's logical size is greater than zero, the index of the last item in the array is the logical size plus 1.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A job that requires sitting at a desk and using a computer for many hours a day qualifies as a sedentary job. 

Answer the following statement true (T) or false (F)

Computer Science & Information Technology