Multiple Choice
John's organization follows a hierarchical approach to data access, with IT personnel having full access, engineering personnel having slightly lesser access and managers having access to only their own department files. Which of the following access control models is in use?
A) DAC
B) DBAC
C) MAC
D) RBAC
Correct Answer:

Verified
Correct Answer:
Verified
Q29: Jack reports that when the phone rings
Q30: Which of the following protocols does the
Q31: Which of the following determines the drive
Q32: John is booting his computer for the
Q33: A technician is conducting a forensics analysis
Q35: How many EIDE drives can be connected
Q36: David configured a password to restrict access
Q37: Which of the following is the major
Q38: You ping the loopback address, but do
Q39: Which of the following combination of components