How are the access control schemes of MAC and RBAC distinguished from DAC?

A. They are based on user identity.
B. They are not based on assigned labels.
C. They are based on object hosted ACLs.
D. They are not based on user decisions.

Answer: D. They are not based on user decisions.

Computer Science & Information Technology

You might also like to view...

The term GPS stands for ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Match each of the following terms to its definition: I. template II. wordwrap III. text effects IV. formatting marks V. graphic

A. decorative formats
B. pictures, charts, and drawing objects
C. not pressing Enter at the end of a line of text
D. a preformatted document
E. also known as nonprinting characters

Computer Science & Information Technology