Which of the following should Bob choseto implement?

Bob needs to implement role-based access control (RBAC) within his company. Hehas learned that there are several approaches to RBAC. He needs to ensure that usersPage 2cess trol-P5.txtare mapped to multiple roles and mapped directly to other types of applications thatdo not have role-based access functionality. Which of the following should Bob choseto implement?

Bob needs to implement role-based access control (RBAC) within his company. Hehas learned that there are several approaches to RBAC. He needs to ensure that usersPage 2cess trol-P5.txtare mapped to multiple roles and mapped directly to other types of applications thatdo not have role-based access functionality. Which of the following should Bob choseto implement?

A.
Non-RBAC

B.
Limited RBAC

C.
Hybrid RBAC

D.
Full RBAC

Explanation:
The types of RBAC are outlined below;- Non-RBAC Users are mapped directly to applications and no roles are used.Page 8cess trol-P5.txt- Limited RBAC Users are mapped to multiple roles and mapped directly to other typesof applications that do not have role-based access functionality.- Hybrid RBAC Users are mapped to multi-application roles with only selected rightsassigned to those roles.- Full RBAC Users are mapped to enterprise roles.



Leave a Reply 4

Your email address will not be published. Required fields are marked *


cymple1

cymple1

According to your correct explanation, the answer should be “B” – Limited RBAC

Dinesh

Dinesh

@ Admin: As per the explanation answer should be “B”. Plz review

admin

admin

Yes, it’s B.
Thanks.

mamcneil

mamcneil

Admin: Can you fix “.Page 8cess trol-P5.txt-” in the question? It is hard to figure out what is being asked for.