Kathleen is implementing an access control system for her organization and builds the following array: Reviewers: update files, delete files Submitters: upload files Editors: upload files, update files Archivists: delete files What type of access control system has Kathleen implemented?

A. Role-based access control
B. Task-based access control
C. Rule-based access control
D. Discretionary access control


Answer: A. Role-based access control

Computer Science & Information Technology

You might also like to view...

How does the PHP engine process whitespace?

How does the PHP engine process white space? a. throws an error b. throws a warning c. prompts the user for input d. ignores it

Computer Science & Information Technology

________ is the process of arranging data in a specific order based on the values in the fields

Fill in the blank(s) with correct word

Computer Science & Information Technology

Microsoft's ________ provides more security and is more efficient in terms of utilization of storage space than FAT

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Testing under ____________________ conditions uses data at the limits of validity.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology