Which of the following is a correct definition mapping?
i.DAC Data owners decide who has access to resources, and ACLs are used to enforcethe security policy.
ii. MAC Operating systems enforce the system’s security policy through the use ofsecurity labels.
iii. RBAC Access decisions are based on each subject’s role and/or functionalposition.
A.
i, ii
B.
i, ii, iii
C.
i, iii
D.
ii
Explanation:
Each of these definitions is correct.