Which of the following is the name for the access contr…

A system administrator is configuring a new file server and has been instructed to configure writeable to by the
department manager, and read only for the individual employee.
Which of the following is the name for the access control methodology used?

A system administrator is configuring a new file server and has been instructed to configure writeable to by the
department manager, and read only for the individual employee.
Which of the following is the name for the access control methodology used?

A.
Duty separation

B.
Mandatory

C.
Least privilege

D.
Role-based



Leave a Reply 0

Your email address will not be published. Required fields are marked *