________ controls access based on comparing security labels with security clearances.

A) RBAC
B) MAC
C) DAC
D) RAC

B) MAC

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a display of files that is limited based on specified criteria

Fill in the blank(s) with correct word

Computer Science & Information Technology

A wireless router typically contains a router, switch, and

What will be an ideal response?

Computer Science & Information Technology