Lattice-based access control is an example of what type of access control policy?

A. DAC
B. RBAC
C. MAC
D. Rule-based access control


C. Lattice-based access control and rule-based access control are examples of the policy called Mandatory Access Control.

Computer Science & Information Technology

You might also like to view...

Which of the following is not an example of a data abstraction?

a) float b) cmath c) ifstream d) an enumeration type

Computer Science & Information Technology

The binary search algorithm in the text makes recursive on subarrays of the array passed to the algorithm. The index values of the array the algorithm searches run from first to last. The subarrays are dermined using the mid-point. How is the mid point calculate?

a) ``` mid = (first - last)/2; ``` b) ``` mid = (first + last)/2; ``` c) ``` mid = (first + last)%2; ``` d) ``` mid = (first - last)%2; ```

Computer Science & Information Technology

What is the purpose of exception handling?

What will be an ideal response?

Computer Science & Information Technology

____ loops always execute the loop statements at least once before the condition is tested.

A. Exit-controlled B. Entrance-controlled C. Pretest D. Variable-condition

Computer Science & Information Technology