A Security administrator needs to implement an access control system that will protect data based on the following matrix DOCUMENT TYPE | SECURITY LEVEL | SECURITY LABEL empl. docs . | private | employee Which of the following models is the administrator implementing?

A. DAC

B. MAC

C. Role-BAC

D. ABAC

C. Role-BAC

Computer Science & Information Technology

You might also like to view...

Effective planning for information security involves:

A. collecting information about an organization's objectives. B. collecting information about an organization's information security environment. C. collecting information about an organization's technical architecture. D. All of the above

Computer Science & Information Technology

To remove an app, right-click or press and hold the app you want to remove, then click or tap Delete.? _____________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology