A security manager needs to simplify how user permissions are managed. The security manager should consider using:

a. Discretionary access control (DAC)
b. Mandatory access control (MAC)
c. Role-based access control (RBAC)
d. Authentication, authorization, and accounting (AAA)


c. Role-based access control (RBAC)

Computer Science & Information Technology

You might also like to view...

?Which of the following is the first step whilecreating a form based on two tables?

A. ?You should first choose the primary table and select the fields to include in the main form. B. ?You should first choose the primary table and select the fields to include in the subform. C. ?You should first choose the related table and select the fields to include in the main form. D. ?You should first choose the related table and select the fields to include in the subform.

Computer Science & Information Technology

In PowerPoint, if you add, delete, or move a slide, all slides will be renumbered automatically

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ function calculates what an investment would be worth in today's dollars

A) FV B) NPV C) PV D) PMT

Computer Science & Information Technology

____________________ is a firewall type that keeps track of each network connection between internal and external systems using a table and that expedites the processing of those communications.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology