One of the system administrators at a company is assigned to maintain a secure computer
lab. The administrator has rights to configure machines, install software, and perform user
account maintenance. However, the administrator cannot add new computers to the domain,
because that requires authorization from the Information Assurance Officer. This is an
example of which of the following?
A.
Mandatory access
B.
Rule-based access control
C.
Least privilege
D.
Job rotation