When using Role Based Access Control (RBAC), permissions are assigned to which of the following?
A. Roles
B. Groups
C. Labels
D. Users
Answer: A
Computer Science & Information Technology
You might also like to view...
One advantage of using a domain is that you only have to log in one time to obtain access to all of the servers within that domain
Indicate whether the statement is true or false
Computer Science & Information Technology
Which command will show what access lists are assigned to an interface and specify direction?
A) show ip interface B) show ip access-list direction any C) show access-lists D) show access-lists interface
Computer Science & Information Technology
_________ often function as standards or procedures to be used when configuring or maintaining systems.
a. EISPs b. ESSPs c. SysSPs d. ISSPs
Computer Science & Information Technology
The arrangement of placeholders on a slide is called a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology