Choose the access control model that allows access control determinations to be performed based on the security labels associated with each user and each data item

Choose the access control model that allows access control determinations to be performed based on the security labels associated with each user and each data item.

Choose the access control model that allows access control determinations to be performed based on the security labels associated with each user and each data item.

A.
MACs (Mandatory Access Control) method

B.
RBACs (Role Based Access Control) method

C.
LBACs (List Based Access Control) method

D.
DACs (Discretionary Access Control) method



Leave a Reply 0

Your email address will not be published. Required fields are marked *