A systems administrator is configuring a new file server and has been instructed to configure writeable to by the department manager, and read only for the individual employee. Which of the following is the name for the access control methodology used?
A. Duty separation
B. Mandatory
C. Least privilege
D. Role-based
Answer: D. Role-based
Computer Science & Information Technology
You might also like to view...
The home page features a panel on the ________ side that displays the most recent activity surrounding your pins and boards
Fill in the blank(s) with correct word
Computer Science & Information Technology
Word has a feature that allows you to link two or more text boxes
Indicate whether the statement is true or false
Computer Science & Information Technology