A security system that uses labels to identify objects and requires formal authorization to use is
BEST described as:
A.
Mandatory Access Control (MAC)
B.
Kerberos
C.
Role-Based Access Control (RBAC)
D.
Discretionary Access Control (DAC)
A security system that uses labels to identify objects and requires formal authorization to use is
BEST described as:
A security system that uses labels to identify objects and requires formal authorization to use is
BEST described as:
A.
Mandatory Access Control (MAC)
B.
Kerberos
C.
Role-Based Access Control (RBAC)
D.
Discretionary Access Control (DAC)