__________ controls access based on comparing security labels with security clearances.
A. MAC B. DAC
C. RBAC D. MBAC
A. MAC
Computer Science & Information Technology
You might also like to view...
A _____________ converts computer data into audio tones that can be transmitted over a normal telephone circuit.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which of the following expressions uses associativity?
A. a * b + c B. a * b / c C. a + b % c D. a - b * c E. a - b / c
Computer Science & Information Technology