A systems administrator is configuring a new file server and has been instructed to configure writeable to by the department manager, and read only for the individual employee. Which of the following is the name for the access control methodology used?

A. Duty separation
B. Mandatory
C. Least privilege
D. Role-based

Answer: D. Role-based

Computer Science & Information Technology

You might also like to view...

The home page features a panel on the ________ side that displays the most recent activity surrounding your pins and boards

Fill in the blank(s) with correct word

Computer Science & Information Technology

Word has a feature that allows you to link two or more text boxes

Indicate whether the statement is true or false

Computer Science & Information Technology