Multiple Choice
_________ controls access based on the identity of the requestor and on access rules (authorizations) stating what requestors are (or are not) allowed to do.
A) Role-based access control
B) Access control
C) Discretionary access control
D) Mandatory access control
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q15: For user authentication to computer, the most
Q16: _ add a specialized layer of security
Q17: _ technology enables the antivirus program to
Q18: A _ authentication system attempts to authenticate
Q19: _ is based on the roles that
Q21: An effective IDS can serve as a
Q22: The key ingredients of an access matrix
Q23: An antiworm approach that blocks outgoing traffic
Q24: The two broad categories of approaches to
Q25: _ define the type and contents of