__________ controls access based on comparing security labels with security clearances.

A. MAC B. DAC

C. RBAC D. MBAC

A. MAC

Computer Science & Information Technology

You might also like to view...

A _____________ converts computer data into audio tones that can be transmitted over a normal telephone circuit.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following expressions uses associativity?

A. a * b + c B. a * b / c C. a + b % c D. a - b * c E. a - b / c

Computer Science & Information Technology