An administrator uses a server with a trusted OS and is configuring an application to go into production tomorrow, In order to make a new application work properly, the administrator creates a new policy that labels the application and assigns it a security context within the trusted OS. Which of the following control methods is the administrator using by configuring this policy?
A. Time based access control
B. Mandatory access control
C. Role based access control
D. Rule based access control
Answer: C. Role based access control
Computer Science & Information Technology
You might also like to view...
In Office 2013, the Help button is located on the Ribbon
Indicate whether the statement is true or false
Computer Science & Information Technology
Why does a DRAM have fewer pins (I/O connections) than a static RAM of the same size (i.e., capacity in bits)?
What will be an ideal response?
Computer Science & Information Technology
"Focus" refers to which data you would edit if you started typing.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A set of methods that could be used on other data structures besides the one they were created for could be used in a general abstract class.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology