Access control decisions are based on responsibilities that an individual user or process has in an organization. This best describes:
A.
MAC (Mandatory Access Control)
B.
RBAC (Role Based Access Control)
C.
DAC (Discretionary Access Control)
D.
None of the above.
Explanation:
The RBAC model allows a user to act in a certain predetermined manner based on the role the user holds in the organization. Users can be assigned certain roles system wide.
Reference: Security + (SYBEX) page 12