A Security administrator needs to implement an access control system that will protect data based on the following matrix DOCUMENT TYPE | SECURITY LEVEL | SECURITY LABEL empl. docs . | private | employee Which of the following models is the administrator implementing?
A. DAC
B. MAC
C. Role-BAC
D. ABAC
C. Role-BAC
You might also like to view...
Express 60 feet per second in miles per hour (use 1 hour is 3600 seconds, 1 mile is 5280 feet).
What will be an ideal response?
Which of the following is true of nesting a control within a label??
A. ?It allows the user to move both the label text and the control as a single unit around the page. B. ?It treats both the label and control as separate objects. C. ?It restricts the association of label text with the control explicitly. D. ?It restricts the movement of the insertion pointinto the control on the selection of the linked label.
EX Case 5-1Maria's grandfather has agreed to help her invest her $2,000 savings account in the stock market. He asked that she create an Excel worksheet to track how her stocks are doing. Because he is coming over in a few days, she wants to update the worksheet. Maria wants to use relative references to calculate the initial cost of her various stocks. Which of the following formulas in Maria's worksheet is an example of a relative reference?
A. =$B$4*B11 B. =$B$4*C11 C. =$B$4 D. =SUM(B7:B10)
Which of the following is true of a code of ethics?
a. It is an individual’s beliefs about right and wrong. b. It is a set of beliefs about right and wrong behavior that are universally accepted. c. It states the principles and core values that are essential to any professional’s work and that govern their behavior. d. It is a system of rules enforced by a set of institutions that states what a person can and cannot do.