How is role-based access control implemented?
A. Through the use of time restrictions
B. By assigning a job name label to subjects
C. On the basis of ACLs
D. By assigning sensitivity labels to all objects
Answer: B. By assigning a job name label to subjects
Computer Science & Information Technology
You might also like to view...
A(n) ________ is an image of an active window on your computer that you can insert into a worksheet
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following is a clause that is not used in an UPDATE statement
a. UPDATE b. SET c. WHERE d. HAVING
Computer Science & Information Technology