A ____ is one in which the computer system enforces the controls without the input or intervention of the system or data owner.
A) role based control
B) network access control (NAC)
C) mandatory access control (MAC)
D) discretionary access control (DAC)
Correct Answer:
Verified
Q1: A _ is an automatic phone-dialing program
Q2: The growth and widespread use of the
Q3: Which centralized authentication method uses UDP?
A) TACACS+
B)
Q4: Biometrics (retinal scans, fingerprints, and the like)
Q5: A bank's automated teller machine (ATM), which
Q7: Client authentication is similar to user authentication
Q8: Which access control principle is most frequently
Q9: Which level in the U.S. military data
Q10: Which access control principle restricts users to
Q11: Which centralized authentication method is the latest
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents