During the information gathering stage of a deploying role-based access control model, which of the following information is MOST likely required?

A. Conditional rules under which certain systems may be accessed
B. Matrix of job titles with required access privileges
C. Clearance levels of all company personnel
D. Normal hours of business operation


Answer: B. Matrix of job titles with required access privileges

Computer Science & Information Technology

You might also like to view...

The speaker notes can be customized so certain things will appear on the printed document in the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Visual Basic, C, C++, and Java are all examples of ____ languages.

a. assembly b. machine-level c. low-level d. high-level

Computer Science & Information Technology

A flat surface is three-dimensional.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A term that describes what occurs when a user enters, edits, or deletes data; also occurs when a user opens, uses, or closes a form or report.

What will be an ideal response?

Computer Science & Information Technology