A security administrator wants to implement a company-wide policy to empower data owners to manage and enforce access control rules on various resources.Which of the following should be implemented?

A. Mandatory access control
B. Discretionary access control
C. Role based access control
D. Rule-based access control

Answer: B. Discretionary access control

Computer Science & Information Technology

You might also like to view...

A distinct part of a document is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Microsoft Excel is a ________ program

A) word processing B) presentation C) database D) spreadsheet

Computer Science & Information Technology