Access controls that are created and administered by the data owner are considered:
A.
MACs (Mandatory Access Control)
B.
RBACs (Role Based Access Control)
C.
LBACs (List Based Access Control)
D.
DACs (Discretionary Access Control)
Explanation:
The DAC model allows the owner of a resource to establish privileges to the information they own. The DAC model would allow a user to share a file or use a file that someone else has shared. The DAC model establishes an ACL that identifies the users who have authorized to that information. This allows the owner to grant or
revoke access to individuals or group of individuals based on the situation. This model is dynamic in nature and allows information to be shared easily between users.