Multiple Choice
__________ is based on the roles that users assume in a system rather than the user's identity.
A) DAC
B) ACM
C) RBAC
D) MAC
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q14: _ is a procedure that allows communicating
Q15: For user authentication to computer, the most
Q16: _ add a specialized layer of security
Q17: _ technology enables the antivirus program to
Q18: A _ authentication system attempts to authenticate
Q20: _ controls access based on the identity
Q21: An effective IDS can serve as a
Q22: The key ingredients of an access matrix
Q23: An antiworm approach that blocks outgoing traffic
Q24: The two broad categories of approaches to