Which of the following is a type of access control that is defined by a policy and cannot be changed by the information owner?

A) Mandatory access control
B) Discretionary access control
C) Role-based access control
D) Rule-based access control


A) Mandatory access control

Computer Science & Information Technology

You might also like to view...

The FDA has approved digestible microchips which contain sensors that transmit information about the patient to the doctor

Indicate whether the statement is true or false

Computer Science & Information Technology

In binary language, each letter of the alphabet, each number, and each special symbol is made up of a unique combination of eight ________

A) bytes B) characters C) kilobytes D) bits

Computer Science & Information Technology

A(n) ________ is most commonly found on a laptop computer

A) stylus B) mechanical mouse C) touchpad D) optical mouse

Computer Science & Information Technology

Identify the foreign keys in this schema. Explain how the entity and referential integrity rules apply to these relations.

What will be an ideal response?

Computer Science & Information Technology