Which of the following presents the STRONGEST access control?

A. MAC
B. TACACS
C. DAC
D. RBAC


Answer: A. MAC

Computer Science & Information Technology

You might also like to view...

Every node in a binary tree can have pointers to

A) its left and right child. B) its left and right parent. C) binary nodes. D) its end nodes. E) None of the above

Computer Science & Information Technology

Which of the following statements is false?

a. You cannot prevent client code from creating objects of a class. b. One common use of a private constructor is sharing initialization code among a class’s other constructors. c. Another common use of private constructors is to force client code to use so-called “factory methods” to create objects. d. A factory method is a public static method that creates and initializes an object of a specified type (possibly of the same class), then returns a reference to it.

Computer Science & Information Technology

In the formula, =1+(2-3)+5/6-6^2, what will Excel evaluate first?

A. 5/6 B. 1+ C. (2-3) D. 6^2

Computer Science & Information Technology

According to the C.I.A. triad, which of the following is the most desirable characteristic for privacy?

A. confidentiality B. availability C. integrity D. accountability

Computer Science & Information Technology