___________ is a security mechanism where a user can gain access only to a resource if the security or system administrator grants the access

a. Role-based access control
b. Mandatory access control
c. Discretionary access control
d. Break the glass access

B.

Computer Science & Information Technology

You might also like to view...

Which two statements are true using Resource Pools?(Choose two)

a. Resource Pools require vSphere DRS to be enabled b. Resource Pools compartmentalize all resources in a cluster c. Resource Pools compartmentalize all resources in a datacenter. d. Resource Pools require vSphere HA to be enabled.

Computer Science & Information Technology

DTDs do not support ____________________, and thus are of limited value in compound documents.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology