1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady_Fox [76]
3 years ago
15

Discretionary access control is an approach whereby the organization specifies use of resources based on the assignment of data

classification schemes to resources and clearance levels to users.
Computers and Technology
1 answer:
Lorico [155]3 years ago
6 0

Answer:

This statement is false. This is the work of Mandatory Access controls (MACs)

Explanation:

Discretionary Access Control (DACL) is an example of Access Control Model (ACL) found in objects of a data user in a computer system. They are security descriptors that issue a list of permissions to users, i.e. who has permissions to access an object. It is discretionary as the name suggest to mean which users have permissions to what files on a windows or linux environment.

On the other hand, Mandatory Access controls (MACs) is an approach whereby the organization specifies the use of resources based on the assignment of data classification schemes to resources and clearance levels to users. It is non-discretionary and is based on how the operating system makes decisions on a security label system. The operating systems grants or disallow access rather than the data owners. They are used so much where classification and confidentiality is of utmost importance

You might be interested in
What is the answer <br> Answer 1<br> Answer 2<br> Answer 3<br> Answer 4
faltersainse [42]

Answer:

Answer 2

Explanation:

8 0
2 years ago
Read 2 more answers
Identify the following verb by number and person by checking on the appropriate boxes.
Makovka662 [10]
Second person ig Imao yeah
3 0
3 years ago
Read 2 more answers
BRAINLIEST You have a small company and want to keep your costs low, but it is important your employees share data. Which networ
solmaris [256]

Answer:Peer-to-peer

Explanation: I hope this helps

5 0
3 years ago
Read 2 more answers
You're going to be mowing lawns as a summer job. How long will it take for your
ahrayia [7]
Hshshshhshshs 3. 4 hours
8 0
3 years ago
I need someone to explain gor me python coding!
forsale [732]

Answer:

Explanation:

Python is a computer programming language often used to build websites and software, automate tasks, and conduct data analysis. Python is a general purpose language, meaning it can be used to create variety of different programs and isn't specialised for any specific problems

8 0
3 years ago
Other questions:
  • On an Ethernet, a ____ is broadcast to every device but is accepted only by the device to which it is addressed.
    5·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an
    5·1 answer
  • What is one of the most effective security tools available for protecting users from external threats?
    15·1 answer
  • -..
    11·1 answer
  • (Game Design) Creating and manipulating data structures is one of the primary functions of a development environment.
    12·2 answers
  • What should be included in research for a problem statement? Select all that apply
    13·2 answers
  • Which of the following are correct? I. Hold the middle mouse button to rotate the model on the screen. II. To pan the model, hol
    15·1 answer
  • Write a program that outputs inflation rates for two successive years and whether the inflation is increasing or decreasing. Ask
    9·1 answer
  • Do you all like IXL?
    8·1 answer
  • What will happend when I got a BSOD in Windows?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!