Describe the discretionary access control (DAC) model.

What will be an ideal response?


Discretionary access control (DAC) is based on the idea that a resource has an owner who may at his or her discretion assign access to that resource. DAC is considered much more flexible than MAC.
 

Computer Science & Information Technology

You might also like to view...

The digital signature standard is a __________ standard that uses the secure hash algorithm.

A. IEEE B. NIST C. ISO D. ITIL

Computer Science & Information Technology

A method that is associated with an individual object is called __________.

a. a static method b. a class method c. an instance method d. an object method

Computer Science & Information Technology

Project managers always must be aware of the _____, so they can monitor the vital tasks and keep a project on track.

A. ?absolute path B. ?relative path C. ?critical path D. ?dynamic path

Computer Science & Information Technology

You can insert a logo on a form using the ____ button in the Controls group.

A. Graphic Art B. Art C. Graphic Image D. Insert Image

Computer Science & Information Technology