A security system that uses labels to identify objects and requires formal authorization to use is BEST described as:

A security system that uses labels to identify objects and requires formal authorization to use is
BEST described as:

A security system that uses labels to identify objects and requires formal authorization to use is
BEST described as:

A.
Mandatory Access Control (MAC)

B.
Kerberos

C.
Role-Based Access Control (RBAC)

D.
Discretionary Access Control (DAC)



Leave a Reply 0

Your email address will not be published. Required fields are marked *