How is role-based access control implemented?

A. Through the use of time restrictions
B. By assigning a job name label to subjects
C. On the basis of ACLs
D. By assigning sensitivity labels to all objects

Answer: B. By assigning a job name label to subjects

Computer Science & Information Technology

You might also like to view...

A(n) ________ is an image of an active window on your computer that you can insert into a worksheet

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is a clause that is not used in an UPDATE statement

a. UPDATE b. SET c. WHERE d. HAVING

Computer Science & Information Technology