A user reports being unable to access a file on a network share. The security administrator determines that the file is marked as confidential and that the user does not have the appropriate access level for that file. Which of the following is being implemented?
A. Mandatory access control
B. Discretionary access control
C. Rule based access control
D. Role based access control
Ans: D. Role based access control
Computer Science & Information Technology
You might also like to view...
Discuss the advantages of using VBA instead of macros to perform specific operations in Access.
What will be an ideal response?
Computer Science & Information Technology
You can navigate through a presentation using the ____________________ next to the Slides list.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Each tweet must be 140 characters or less in length
Indicate whether the statement is true or false
Computer Science & Information Technology
Without the visual impact of ____, Web pages are neither interesting nor motivating.
a. color b. contrast c. shapes d. all of the above
Computer Science & Information Technology