1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oxana [17]
3 years ago
13

With which access control method do system administrators establish what information users can share?

Computers and Technology
1 answer:
monitta3 years ago
8 0

Answer: Mandatory access control

Explanation:

Mandatory access control is defined as the highly uncompromising access control. This access control provides accessing resources of the system under surveillance of  system administrator or operating system.

  • It does not permit access of any subject for operating or functioning on object  without authority.It has the ability to manipulate the control through system administrator.
  • It controls who can share information by accessing, what information can be shared, circumstance of access etc.

You might be interested in
A(n) _________ is any system resource that is placed onto a functional system but has no normal use for that system. If it attra
Kisachek [45]

Answer:

Honeytoken

Explanation:

Honeytokens (aka honey traps or honeypots) may be described as bogus or dummy IT resources which are created or placed in a system or network for the sole purpose of attracting the attention of cyber-criminals and being attacked. These might be servers, applications, complete systems or datasets which are placed online (via the public internet, or a public-facing gateway to a private network), in order to attract cyber-attackers.

Honeytokens may be specifically defined as pieces of data which on the surface look attractive to potential attackers, but actually have no real value – at least, not to the attacker. For the owners of the tokens (i.e. the people who set the trap), they can be of great value, as they contain digital information which is monitored as an indicator of tampering or digital theft.

8 0
3 years ago
What is lasso tool write the name of any modelling and animation software<br>​
VladimirAG [237]

Explanation:

6579689993 and password is 3250 I RISHAVjoin please I join yar

7 0
3 years ago
Which domain refers to the equipment and data an organization uses to support its IT infrastructure. It includes hardware, opera
vovikov84 [41]

Answer:

D. System/Application Domain

Explanation:

A system or application domain is used by an organization to supports its IT infrastructure, holding all the business critical mission system, applications and data. All the resources of the company are contained in this domain, and is accessible by a member.

LAN to WAN domain links the company's infrastructure or local area network to a wide area network or the internet. The WAN domain simply holds publicly the data of an organisation, while remote access domain is meant for a small group of workers in the office or working from home.

8 0
4 years ago
How to print something nad input on same line python
Serhud [2]
To get everything on one line with two inputs is not (easily) achievable, as far as I know. The closest you can get is: print 'I have', a=input() print 'apples and', p=input() print 'pears. '
7 0
2 years ago
Who creates Virus ? virus is not made for what?
m_a_m_a [10]
Virus is created by some dishonest people.
Virus iis not made for open source software
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which method can help you prevent RSI while using a keyboard?
    14·1 answer
  • A page with no meaningful content that is full of ads and the webmaster makes money from if someone clicks on them is called____
    7·1 answer
  • In C++ Please :
    6·1 answer
  • The function below takes a single argument: data_list, a list containing a mix of strings and numbers. The function tries to use
    6·1 answer
  • How many bytes are there in 256 Kbytes?
    6·1 answer
  • Technologies can offer safety and protection for people
    11·1 answer
  • Which of the following is another type of brake system used in trucks
    5·1 answer
  • Is a pocket watch consider a computer
    15·1 answer
  • WILL GIVE BRAINLIEST!!!!!
    8·1 answer
  • What are the impacts of mobile phone?as well as the positive and negative impacts?​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!