A systems administrator is configuring a new file server and has been instructed to configure writeable to by the department manager, and read only for the individual employee. Which of the following is the name for the access control methodology used?

A. Duty separation
B. Mandatory
C. Least privilege
D. Role-based


Answer: D. Role-based

Computer Science & Information Technology

You might also like to view...

Which of the following statements is true?

a. The code in a finally block is executed only if an exception occurs. b. The code in a finally block is executed only if an exception does not occur. c. The code in a finally block is executed only if there are no catch blocks. d. None of the above are true.

Computer Science & Information Technology

Which configuration changes would you need to apply to routers if you wanted to allow SMB/CIFS browsing across multiple subnets without configuring master browsers?

What will be an ideal response?

Computer Science & Information Technology

A ____ is one of the most basic units of storage within a database, typically representing unique and specific data objects.

A. table B. page C. buffer D. sheet

Computer Science & Information Technology

Referring to the figure above, to access this dialog box, you should click New Style on the ____ panel.

A. Manage Styles B. Apply Styles C. Format Styles D. Style Sheets

Computer Science & Information Technology