An organization is trying to decide which type of access control is most appropriate for the network. The current access control approach is too complex and
requires significant overhead. Management would like to simplify the access control and provide user with the ability to determine what permissions should be
applied to files, document, and directories. The access control method that BEST satisfies these objectives is:
A.
Rule-based access control
B.
Role-based access control
C.
Mandatory access control
D.
Discretionary access control
In computer security, discretionary access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria “as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong.