Briefly describe role-based access control.
What will be an ideal response?
To determine what access privileges to assign, one model that should be used is role-based access control (RBAC). Instead of setting permissions for each user or group, permissions are assigned to a position ("role") and then users and other objects are assigned to that role. The users and objects inherit all of the permissions for the role. For example, instead of creating a user account Jeff.Butterfield and assigning privileges to that account, the role Comptroller can be created based on the privileges that position should have. Then the user can be assigned to that role. Individuals can hold multiple roles in RBAC.
The flexibility of RBAC makes it not only easier to establish permissions based on job classification but also facilitates enforcing those permissions. RBAC is considered a major step in keeping a WLAN secure.
You might also like to view...
GroupBoxes and Panels are used to:
a) bundle a bunch of controls into one package b) allow more than one RadioButton to be true at the same time if the radio buttons are on different GroupBoxes or Panels c) organize the form in a more orderly fashion d) All of the above
Discuss what the process of vendor evaluation should focus on.
What will be an ideal response?
SQL Server can generate a self-signed ______________ to encrypt data.
Fill in the blank(s) with the appropriate word(s).
Analysis of data shows
A. Whether the organization, system, or process is improving. B. Factors that cause change. C. Connections or correlations between or among various factors. D. All of the above.