With which access control method do system administrators establish what information users can share?

A. discretionary access control
B. mandatory access control
C. administrative access control
D. role-based access control


Answer: B

Computer Science & Information Technology

You might also like to view...

The ________ key is used to delete text to the left of the insertion point.

A. Delete B. Shift + Delete C. Backspace D. Shift + Backspace

Computer Science & Information Technology

The interface of the VoIP telephone system to the PSTN is called what?

What will be an ideal response?

Computer Science & Information Technology

Blogger is a Google communication platform for video calls, phone calls, or messages

Indicate whether the statement is true or false

Computer Science & Information Technology

Dropping a table also deletes any data that you entered into the table.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology