A Security administrator needs to implement an access control system that will protect data based on the following matrix DOCUMENT TYPE | SECURITY LEVEL | SECURITY LABEL empl. docs . | private | employee Which of the following models is the administrator implementing?
A. DAC
B. MAC
C. Role-BAC
D. ABAC
C. Role-BAC
Computer Science & Information Technology
You might also like to view...
Effective planning for information security involves:
A. collecting information about an organization's objectives. B. collecting information about an organization's information security environment. C. collecting information about an organization's technical architecture. D. All of the above
Computer Science & Information Technology
To remove an app, right-click or press and hold the app you want to remove, then click or tap Delete.? _____________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology