__________ access control controls access based on the identity of the requestor and on access rules stating what requestors are or are not allowed to do.

Fill in the blank(s) with the appropriate word(s).

Discretionary

Computer Science & Information Technology

You might also like to view...

A service set identifier is known as a(n) ________

A) VPN B) SAN C) SSID D) WPA2

Computer Science & Information Technology

Richard received a message from Matthew that was encrypted using an asymmetric cryptosystem. What key should Richard use to decrypt the message?

a. Matthew's public key b. Matthew's private key c. Richard's public key d. Richard's private key e. Shared secret key

Computer Science & Information Technology