In a ____ system, the subject's access permissions are assigned based on the security attributes that they possess and the rules that have been established for those attributes.

A. mandatory access control
B. role-based access control
C. discretionary access control
D. delegated access control

Answer: A

Computer Science & Information Technology

You might also like to view...

For the GETPIVOTDATA function, the ________ argument specifies the values you want to retrieve from the PivotTable

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following statements is false?

a. The impressive functions performed by computers involve only the simplest manipulations of 1s and 2s. b. ASCII is a popular subset of Unicode. c. Fields are composed of characters or bytes. d. On some operating systems, a file is viewed simply as a sequence of bytes.

Computer Science & Information Technology