The IT department has setup a share point site to be used on the intranet. Security has established the groups and permissions on the site. No one may modify the permissions and all requests for access are centrally managed by the security team. This is an example of which of the following control types?

A. Rule based access control
B. Mandatory access control
C. User assigned privilege
D. Discretionary access control


Answer: D. Discretionary access control

Computer Science & Information Technology

You might also like to view...

Are there any disadvantages to low fidelity prototyping? If so, what are they?

What will be an ideal response?

Computer Science & Information Technology

Which of the following statements about proprietary software security implementations is false?

a) Developers are sometimes unwilling to disclose security flaws. b) They are not always interoperable with other security programs. c) They use security by obscurity. d) They cannot be, in general, as secure as open-source software security implementations.

Computer Science & Information Technology

You can set which of the following characteristics of a brush tip?

a. Size b. Shape c. Hardness d. All of the above

Computer Science & Information Technology

Critical Thinking QuestionsCase 2-2Your friend Kathryn is planning to use Outlook to manage her schedule during her first year of college. She is in the process of configuring Outlook to best suit her purposes, and she turns to you for help. Kathryn would like to display her schedule for an entire seven-day week. Which view should she use? a. Dayc. Weekb. Work Weekd. Schedule

What will be an ideal response?

Computer Science & Information Technology