Multiple Choice
__________ is based on the roles the users assume in a system rather than the user's identity.
A) DAC
B) RBAC
C) MAC
D) URAC
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q6: The authentication function determines who is trusted
Q7: Role hierarchies make use of the concept
Q8: _ access control controls access based on
Q9: An independent review and examination of system
Q10: An ABAC model can define authorizations that
Q12: _ controls access based on comparing security
Q13: _ is verification that the credentials of
Q14: A _ is a mapping between a
Q15: A constraint is a defined relationship among
Q16: Any program that is owned by, and