When using Role Based Access Control (RBAC), permissions are assigned to which of the following?

A. Roles
B. Groups
C. Labels
D. Users


Answer: A

Computer Science & Information Technology

You might also like to view...

One advantage of using a domain is that you only have to log in one time to obtain access to all of the servers within that domain

Indicate whether the statement is true or false

Computer Science & Information Technology

Which command will show what access lists are assigned to an interface and specify direction?

A) show ip interface B) show ip access-list direction any C) show access-lists D) show access-lists interface

Computer Science & Information Technology

_________ often function as standards or procedures to be used when configuring or maintaining systems.

a. EISPs b. ESSPs c. SysSPs d. ISSPs

Computer Science & Information Technology

The arrangement of placeholders on a slide is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology