Determining what a user can access based on the data, not the subject’s identity, is called:
A.
Content-based
B.
Role-based
C.
Rule-based
D.
Capability table
Explanation:
Content-based access controls look at the sensitivity of the data to
determine if a subject can access it or not. Content-dependent access control,
access to objects is determined by the content within the object. Content-dependent
filtering is used when corporations employ e-mail filters that look for specific
strings, such as "confidential","social security number,","top secret," and any other types of words the company deems suspicious.