A system administrator is configuring a new file server and has been instructed to configure writeable to by the
department manager, and read only for the individual employee.
Which of the following is the name for the access control methodology used?
A.
Duty separation
B.
Mandatory
C.
Least privilege
D.
Role-based