1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mrs_skeptik [129]
2 years ago
11

You have implemented an access control method that only allows users who are managers to access specific data. Which type of acc

ess control model is being used?
Computers and Technology
2 answers:
kifflom [539]2 years ago
7 0

The type of access control model which is being used to allow only managers to access specific data is role-based access control (RBAC).

<h3>What is role-based access control (RBAC)?</h3>

Role-based access control (RBAC) can be defined as a type of access control model that is designed and developed to grant access to an end user, especially based on his or her role in an organization.

This ultimately implies that, the type of access control model which was used to allow only managers access specific data in this organization is known as role-based access control (RBAC).

Read more on access control here: brainly.com/question/14267297

#SPJ12

dusya [7]2 years ago
6 0

Answer:

Role-based access control (RBAC)

Explanation:

RBAC is a strategy of limiting network access based on specific user responsibilities inside an organization. It guarantees that individuals only have access to the information they need to complete their jobs and prevents them from obtaining unnecessary information to them. The job of an individual in the organization dictates the rights that worker is allowed, ensuring that lower-level employees do not have access to confidential data or conduct high-level duties.

Roles in the role-based access control data model are determined by a number of variables, such permission, duty, and job skill. As a result, organizations may specify whether a person is an end user, an admin, or a specialized user. Furthermore, access to computer resources might be limited to certain operations, such as viewing, creating, or modifying data. Limiting network access is critical for firms that have a large workforce, use contractors, or allow access to other parties such as customers and suppliers, making it extremely difficult to adequately manage network access. Organizations that use RBAC are better equipped to data encryption and essential applications.

You might be interested in
Finish the statement below to correctly describe the Defense Enrollment Eligibility Reporting System (DEERS). DEERS is a central
WITCHER [35]

Answer:  A- the antlers and horns are structural adaptations. The fighting is a behavioral adaptation.

Antlers and horns are physical adaptations that some mammals have acquired over time. However, fighting is not a physical feature but a behavioral adaptation used to beat other males during mating season.

Explanation:

5 0
3 years ago
What is the role of computer in modern problem solving​
REY [17]

Answer:

Una computadora es una herramienta muy básica para hacer tareas repetitivas de forma más eficiente. Una computadora no es capaz de analizar un problema y obtener una solución.

Explanation:

3 0
3 years ago
The beginning statement of a loop is called a declaration.<br> True<br> False
Ilya [14]
It is true the reason why it is true is
4 0
3 years ago
Read 2 more answers
The following is a true example of a computer: A. Toyota Camry
fomenos

Answer:

D

Explanation:

They all fit the definition of a computer

7 0
3 years ago
Identifying what you will need to review takes place during?
marishachu [46]
It takes places during surveying.

For example, let's say you want to review your own produced game application software, and found out whether it satisfy your consumer or not

Before you conduct the survey, you have to identify what aspect you want to find out from your consumers , such as : Does it have any bug ? Is it challenging enough ? is the graphic good enough ? etc
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which statement describes the word "iterative"?
    7·2 answers
  • Angle, oblique, regular, demi, roman, heavy, extra bold, expanded, and compressed are ___________ . Select one: A. type styles B
    10·1 answer
  • What image format should be used to keep the file size manageable​
    14·1 answer
  • Micheal has increased the contrast of the given picture. Which feature or menu option of a word processing program did he use? A
    15·1 answer
  • Raid level 6 is basically the same as RAID level 5, but it adds a second set of parity bits for added fault tolerance and allows
    7·1 answer
  • Analytical CRM systems are the input for operational CRM systems.<br><br> True<br><br> False
    11·1 answer
  • Of the measures of feasibility in the accompanying figure, ____ considers points such as "Does the proposed platform have suffic
    8·1 answer
  • When we code an algorithm, we need to provide the commands in the order we want the
    10·1 answer
  • Who is the prince of math?
    5·2 answers
  • Write a class called TextProcessor that implements the methods listed below. Your implementation may use the charAt() and length
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!