Multiple Choice
__________ controls access based on comparing security labels with security clearances.
A) MAC
B) DAC
C) RBAC
D) MBAC
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q7: Role hierarchies make use of the concept
Q8: _ access control controls access based on
Q9: An independent review and examination of system
Q10: An ABAC model can define authorizations that
Q11: _ is based on the roles the
Q13: _ is verification that the credentials of
Q14: A _ is a mapping between a
Q15: A constraint is a defined relationship among
Q16: Any program that is owned by, and
Q17: A concept that evolved out of requirements