In which access control model is all that is not expressly permitted is forbidden?

A. MAC
B. RBAC
C. Rule-based access control
D. DAC


D In a DAC access control model, all that is not expressly permitted is forbidden.

Computer Science & Information Technology

You might also like to view...

A "reentrant function" is one that it is safe to call

A. more than once B. even if it is already active

Computer Science & Information Technology

Outline the design of a scheme that uses message retransmissions with IP multicast to overcome the problem of dropped messages. Your scheme should take the following points into account:

i) there may be multiple senders; ii) generally only a small proportion of messages are dropped; iii) unlike the request-reply protocol, recipients may not necessarily send a message within any particular time limit. Assume that messages that are not dropped arrive in sender ordering.

Computer Science & Information Technology

When you are satisfied with your edited video, the next step is to specify ____ settings.

A. movie B. input C. DVD D. output

Computer Science & Information Technology

A behavior is code added to a Web page that enables users to ____.

A. interact with various elements in the Web page B. alter the Web page in different ways C. cause tasks to be performed D. all of the above

Computer Science & Information Technology