1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mrs_skeptik [129]
1 year ago
11

You have implemented an access control method that only allows users who are managers to access specific data. Which type of acc

ess control model is being used?
Computers and Technology
2 answers:
kifflom [539]1 year ago
7 0

The type of access control model which is being used to allow only managers to access specific data is role-based access control (RBAC).

<h3>What is role-based access control (RBAC)?</h3>

Role-based access control (RBAC) can be defined as a type of access control model that is designed and developed to grant access to an end user, especially based on his or her role in an organization.

This ultimately implies that, the type of access control model which was used to allow only managers access specific data in this organization is known as role-based access control (RBAC).

Read more on access control here: brainly.com/question/14267297

#SPJ12

dusya [7]1 year ago
6 0

Answer:

Role-based access control (RBAC)

Explanation:

RBAC is a strategy of limiting network access based on specific user responsibilities inside an organization. It guarantees that individuals only have access to the information they need to complete their jobs and prevents them from obtaining unnecessary information to them. The job of an individual in the organization dictates the rights that worker is allowed, ensuring that lower-level employees do not have access to confidential data or conduct high-level duties.

Roles in the role-based access control data model are determined by a number of variables, such permission, duty, and job skill. As a result, organizations may specify whether a person is an end user, an admin, or a specialized user. Furthermore, access to computer resources might be limited to certain operations, such as viewing, creating, or modifying data. Limiting network access is critical for firms that have a large workforce, use contractors, or allow access to other parties such as customers and suppliers, making it extremely difficult to adequately manage network access. Organizations that use RBAC are better equipped to data encryption and essential applications.

You might be interested in
What is an example of constructive criticism for an employee who frequently arrives late?
aleksley [76]
I believe the correct answer is A
5 0
3 years ago
Read 2 more answers
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
joja [24]

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of <em>compromise</em> include log-in red flags, unusual outbound network traffic.

Read related link on:

brainly.com/question/25522987

8 0
3 years ago
How is knowing how to use word or docs importamt?
ollegr [7]
For 90% of users, the word processing capabilities of Google Docs is more than enough. But for some, Microsoft Word's advanced features will be important. ... You also get far more powerful templates, which could speed up your work, depending on what you use Word for.
3 0
2 years ago
Select all the items of the Design Elements.
maks197457 [2]
Answer: A: B: E: I think
5 0
2 years ago
The application layer in the tcp/ip protocol suite is usually considered to be the combination of ________ layers in the osi mod
navik [9.2K]
Application Presentation and Session Layers.
8 0
3 years ago
Other questions:
  • Write a function called simulate_several_key_strikes. It should take one argument: an integer specifying the number of key strik
    7·1 answer
  • How would you define data science ?
    10·1 answer
  • 1. Some of the music in the 1960s was used to protest social and political issues. Is music still used as a form of protest? Why
    13·1 answer
  • Given that Apache and Internet Information Services (IIS) are the two most popular web application servers for Linux and Microso
    10·1 answer
  • Which of the following is true regarding the use of instance variable j in class B1?
    15·1 answer
  • Who found the first computer bug in 1947, and invented the concept of a compiler in 1952
    6·1 answer
  • Can you answer this question?
    9·1 answer
  • Ivan wants to have code in a game that will make it possible to change the speed of a swimmer in the game. Which of these does I
    8·1 answer
  • If Laura wanted to solve a problem using recursion where the last statement executed is the call to the same method, what type o
    8·1 answer
  • Write a program. in QBAsSIC
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!