1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
romanna [79]
2 years ago
3

An access control method based on the subject's clearance and the object's classification is referred to as?

Computers and Technology
1 answer:
faust18 [17]2 years ago
3 0

Mandatory access control is a technique for restricting access based on the classification of the object and the subject's clearance (MAC).

<h3>What is mandatory access control (MAC)?</h3>
  • Mandatory access control (MAC) is a type of access control in computer security in which the operating system or database restricts a subject's or initiator's ability to access or otherwise perform some sort of operation on an object or target.
  • In an operating system, a subject is often a process or thread, and objects are things like files, directories, shared memory segments, TCP/UDP ports, IO devices, and so on.
  • Subjects and objects each have their own set of security characteristics.
  • When a subject tries to access an object, an authorization rule enforced by the operating system kernel examines these security attributes and determines whether or not the access is permitted.
  • Mandatory access control is a technique for restricting access based on the classification of the object and the subject's clearance (MAC).

To know more about mandatory access control, refer:

brainly.com/question/13266994

#SPJ4

You might be interested in
Disadvantages of the divisional organization structure are _____. each division is able to operate independently from the parent
Fantom [35]

Answer:

Disadvantages:

1. A division may feel separated from the parent company because it has too much independence

2. This feeling of separation may lead to the division only worrying about meeting it's goals and objectives and not the companies as a whole

3. This system may be more expensive to operate and cannot share resources with other divisions

Explanation:

8 0
2 years ago
LINKS! <br><br> Help! Is there a way to make them not show up??
Nat2105 [25]
No you can report it tho it’s annoying
7 0
3 years ago
Read 2 more answers
What is the best way to determine if a cable inside a computer is a data and instruction cable or a power cable?
Liono4ka [1.6K]
You have to trace it back to its source to determine it. Data cables are flat and cables are round.
4 0
3 years ago
modern managed cloud service providers will often use secure keyboard/video/mouse (kvm) devices within their data centers. these
professor190 [17]

A cloud service providers uses KVM in their data centers because they are gravely concerned with insider threats.

KVM is a system for management, monitoring and control of a data center environment from a central location. In the data center this system is very necessary because the data center has multiple servers and computers. With this system the server can be connected and controlled from a remote location. This includes mapping the physical locations of accessible virtual drives.

Your question is incomplete, but most probably you full question was:

Modern managed cloud service providers will often use secure Keyboard/Video/Mouse (KVM) devices within their data centers. these devices are extremely expensive compared to their non-secured counterparts. which of the following is one of the reasons cloud service providers do this?

  • They have plenty of revenue and can afford it
  • They are gravely concerned with insider threats
  • Cloud data centers need very few of these devices
  • Managed cloud providers often manufacture their own devices as well

Learn more about servers brainly.com/question/27960093

#SPJ4

7 0
1 year ago
Match each word to its correct meaning.
monitta

Answer:

1. Graphics.

2. Clip art.

Explanation:

1. Graphics: visual representations of information that are not text-images, photos, symbols, diagrams, and so on. Some examples of software applications used for graphics design are CorelDraw, Adobe Illustrator, Affinity Designer, Inkscape, Adobe Photoshop, etc.

Adobe Photoshop is a proprietary software application designed and developed by Adobe inc. for both Windows and MacOS operating system. It is a raster graphics editor that's typically used for imaging and graphics design. It comprises of various shape tools such as ellipse, line, polygon, triangle, custom shape and rectangle.

2. Clip art: digital artwork such as symbols and pictures that can be imported for use in documents or other software applications.

7 0
3 years ago
Other questions:
  • Plane eyes I don't know
    9·1 answer
  • What type of engineering drawing use symbols to represent components drawings
    6·1 answer
  • NEED HELP WILL MARK BRAINLIEST AND 100 POINTS FOR ANSWER Which LIKE operator would match a single character?
    9·2 answers
  • Henry is planning to visit Spain for a vacation. He wants to learn Spanish, but he prefers to do it in a fun way. He searches on
    8·2 answers
  • Which of these colors is most likely to be outside the CMYK gamut?
    15·1 answer
  • 11. You tried to turn on your desktop computer, but your desktop computer would not even turn on. You pressed the power button,
    8·1 answer
  • Consider Emily's balance statement:
    6·1 answer
  • Who used the ICT in a report to UK government in 1997
    12·1 answer
  • How do I change my username/display name
    12·2 answers
  • Which of the following statements is false? A. The internet has developed at a consistent rate throughout the world. B. There ar
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!