Which of the following specifies the authorization level that each user of an information asset is permitted to access, subject to the need-to-know principle?

A. discretionary access controls
B. task-based access controls
C. security clearances
D. sensitivity levels


Answer: C

Computer Science & Information Technology

You might also like to view...

In the accompanying figure, name is an element from the _______ vocabulary.

A. students B. instructor C. course D. description

Computer Science & Information Technology

Quick Storage _____________ can move the virtual disks of a running machine regardless of the storage type.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A useful CLI to copy and convert data, such as for benchmarking purposes, is

A) c B) cd C) cp D) dd

Computer Science & Information Technology

In a ____, the tree is structured as a shallow hierarchy where there is no subordinate CAs.

A. web of trust B. Web hierarchy C. distributed model D. trusted issuer hierarchy

Computer Science & Information Technology