A group of developers is collaborating to write software for a company. The developers need to work in subgroups and control who has access to their modules. Which of the following access control methods is considered user-centric?
A) Time-based
B) Mandatory
C) Rule-based
D) Discretionary
Correct Answer:
Verified
Q804: When sending messages using symmetric encryption, which
Q805: A bank uses a wireless network to
Q806: Which of the following authentication concepts is
Q807: A security administrator suspects that a DDoS
Q808: An external attacker can modify the ARP
Q810: A business sector is highly competitive, and
Q811: A company stores highly sensitive data files
Q812: A security administrator installed a new network
Q813: A technician is configuring a load balancer
Q814: Which of the following is a compensating
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents