1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mrs_skeptik [129]
1 year ago
11

You have implemented an access control method that only allows users who are managers to access specific data. Which type of acc

ess control model is being used?
Computers and Technology
2 answers:
kifflom [539]1 year ago
7 0

The type of access control model which is being used to allow only managers to access specific data is role-based access control (RBAC).

<h3>What is role-based access control (RBAC)?</h3>

Role-based access control (RBAC) can be defined as a type of access control model that is designed and developed to grant access to an end user, especially based on his or her role in an organization.

This ultimately implies that, the type of access control model which was used to allow only managers access specific data in this organization is known as role-based access control (RBAC).

Read more on access control here: brainly.com/question/14267297

#SPJ12

dusya [7]1 year ago
6 0

Answer:

Role-based access control (RBAC)

Explanation:

RBAC is a strategy of limiting network access based on specific user responsibilities inside an organization. It guarantees that individuals only have access to the information they need to complete their jobs and prevents them from obtaining unnecessary information to them. The job of an individual in the organization dictates the rights that worker is allowed, ensuring that lower-level employees do not have access to confidential data or conduct high-level duties.

Roles in the role-based access control data model are determined by a number of variables, such permission, duty, and job skill. As a result, organizations may specify whether a person is an end user, an admin, or a specialized user. Furthermore, access to computer resources might be limited to certain operations, such as viewing, creating, or modifying data. Limiting network access is critical for firms that have a large workforce, use contractors, or allow access to other parties such as customers and suppliers, making it extremely difficult to adequately manage network access. Organizations that use RBAC are better equipped to data encryption and essential applications.

You might be interested in
PLEASE HELP!!! History abounds with instances in which the work of scientists and artists were affected by the political, religi
Masteriza [31]
Social Media affects them
7 0
3 years ago
Which of the following statements is false?
SOVA2 [1]
People can use software to make their lives more enjoyable
5 0
2 years ago
Felicity wants to capture the attention of the regular subway commuters in her area though her print advertisements​
mel-nik [20]

Answer: billboard

Explanation:

Plato answer

8 0
2 years ago
Select the correct text in the passage.
oksian1 [2.3K]

Answer:

Answer is given below

Explanation:

The index of the smallest value returned by function positionMin(),

and it is done by line "return minPosition;"

The input array is given as an argument in function selSort() and it is done by line "public static void selSort(int [] vals)" Here vals is input array argument.

6 0
3 years ago
At one college, the tuition for a full-time student is $6,000 per semester. It has been announced that the tuition will increase
xxMikexx [17]

Answer:grhgrt

Explanation:

4 0
2 years ago
Other questions:
  • Difference between implicit and explicit type casting
    7·2 answers
  • Initially, later, and finally are examples of what kind of words
    9·1 answer
  • How to write a program that prompts the user to input two POSITIVE numbers — a dividend (numerator) and a divisor (denominator).
    13·1 answer
  • Jenis-jenis grafik bagi imej​
    10·1 answer
  • Define a function below called average_strings. The function takes one argument: a list of strings. Complete the function so tha
    11·1 answer
  • Write a program that uses a two-dimensional array to store the highest and lowest temperatures for each month of the year. Promp
    10·1 answer
  • The famous study entitled ""Protection Analysis: Final Report"" focused on a project undertaken by ARPA to understand and detect
    14·1 answer
  • To ____ a public member function of a base class in the derived class, the corresponding function in the derived class must have
    12·1 answer
  • As a general rule, what is the size of a brochure?
    11·1 answer
  • 1 point
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!