John's organization follows a hierarchical approach to data access, with IT personnel having full access, engineering personnel having slightly lesser access and managers having access to only their own department files. Which of the following access control models is in use?
A) DAC
B) DBAC
C) MAC
D) RBAC
Correct Answer:
Verified
Q119: Which of the following have the ability
Q120: Which of the following terms describes the
Q121: Jack is a security advisor in his
Q122: Which of the following is often misused
Q123: John observes that a server in his
Q125: Which of these attacks use more than
Q126: Which of these methods allows an organization
Q127: Which of the following access control models
Q128: Which of the following proxy server types
Q129: John is a receiving a lot of
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents