1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anyanavicka [17]
4 years ago
12

An organization is trying to decide which type of access control is most appropriate for the network. The current access control

approach is too complex and requires significant overhead Management would like to simplify the access control and provide user with the ability to determine what permissions should be applied to files, document, and directories. The access control method that BEST satisfies these objectives is:________
A. Rule-based access control
B. Role-based access control
C. Mandatory access control
D. Discretionary access control
Computers and Technology
1 answer:
alisha [4.7K]4 years ago
8 0

Answer: D.) Discretionary access control

Explanation: Access control modes provides networks with a security system used for moderating, risk prevention and privacy maintainance of data and computing systems. Several access control modes exists depending on the degree of control required. In the discretionary access control approach, users are afforded the freedom and flexibility of making choices regarding permissions granted to programs. Hence, in this mode, permission are user-defined and as such sets privileges based on how the user deems fit.

You might be interested in
A.) Write a code statement to assign the value 7.3 to a variable with an identifier<br> timer.
Georgia [21]

The code segment that assigns value to the variable named timer is:

timer = 7.3

<h3>How to write the code</h3>

To assign a value to a variable, we make use of the following syntax:

variable = value

In this case;

The variable is timer and the value is 7.3

Hence, the required code segment is: timer = 7.3

Read more about code segments at:

brainly.com/question/18430675

8 0
2 years ago
The process known as AAA (or “triple A”) security involves three components. _____________ means ensuring that an authenticated
kirill115 [55]

Answer:

The process known as AAA (or “triple A”) security involves three components. Authorization means ensuring that an authenticated user is allowed to perform the requested action.

7 0
4 years ago
One of the most common uses of spreadsheet programs are communicating with others. O editing images and photos. O tracking and m
Mama L [17]

Answer:        tracking and manipulating data.

Explanation: A spreadsheet is nothing more than a large ledger like the ones accountants and office workers used years ago. It was a ruled paper that data and information was entered on in order to keep track of money, inventory, and other information.  Adding or subtracting from one column would change the totals and values overall. Now, with computers we have the electronic version and store the data on disc, flash drive or other connected media.

8 0
3 years ago
Read 2 more answers
Describe the following types of data hazards. RAW WAR WAW
aleksandr82 [10.1K]

Answer: Data hazards are the factor behind the damage/problem created in the data of the CPU . There are three types of data hazards which are as follows:-

By considering two element "A" and "B"

  • RAW(Read after write)- If the element A tries to read the value before the element B has written it then element A will receive the previous value which is accordingly incorrect .
  • WAR(Write after read)-Element B write a value for element A which not read by it.So, it incorrectly gets a new destination assigned.
  • WAW(Write after write)-Element B tries to write the value for the element A before element A writes it, thus creating a hazard.

5 0
3 years ago
What would you present to a player if you wanted to create and sustain “tactical immersion?” Which genres of games most support
egoroff_w [7]
Games like call of duty is an example of that immersion 

4 0
4 years ago
Other questions:
  • How is gawain tempted​
    9·1 answer
  • Is a set of standards that define how email is to be processed between mail servers is exactly the same as smtp copies an e-mail
    10·1 answer
  • Which statement is true regarding achievers?
    8·1 answer
  • Write a recursive function that takes a non-negative integer as an argument and displays the same number in reverse order (i.e.
    15·1 answer
  • If the ____________ is broken on a laptop, chances are other parts are also broken.
    12·1 answer
  • Does any body know how to bypass easy anti cheat on crossout
    7·1 answer
  • What is text or pictures behind the document called?​
    13·1 answer
  • Convert the following decimal numbers into binary numbers. <br><br>pls ASAP<br>​
    15·1 answer
  • Write a program that asks the user for his or her name, then asks the user to enter a sentence that describes himself or herself
    11·1 answer
  • Which programming scenario would most likely involve this array block?<br><br>SOMEONE PLEASE HELPPP​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!