1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
12

Which access control principle limits a user's access to the specific information required to perform the currently assigned tas

k
Computers and Technology
1 answer:
Svetradugi [14.3K]3 years ago
4 0

Answer:

The answer is "Need-To-Know Access Control Principle"

Explanation:

There are three types of access control methods such as Role-Based Access Control, Discretionary Access Control and Mandatory Access Control.

The access control principle that limits/blocks the user from gaining access to a folder/information/procedure within the system is called "Need-To-Know Access Control Principle".

I hope this answer helps.

You might be interested in
Releasing refrigerant R-12 into the atmosphere is a criminal offense
nevsk [136]
I'm guessing you want a yes or no... I think yes.
8 0
3 years ago
Read 2 more answers
What are some ways to rename a worksheet? Check all that apply.
Mamont248 [21]

Answer:

Click the Home tab, click Format, click Rename Sheet, type the name, and press Enter

Explanation:

im  not really sure but i think this is the answer

have a good day

3 0
3 years ago
An employee sets up an automation that transfers files in a specific folder on their PC to a remote drive for archiving, provide
Yuri [45]

Answer:

Rule based automation

Explanation:

8 0
3 years ago
Plz answer me will mark as brainliest ​
Vesnalui [34]
I’m pretty sure the answer for 1 is B.
And the answer for 2 is True.
4 0
3 years ago
How to solve this?<br> In c++
andrey2020 [161]

Explanation:

6* 49 because you multiply the number of dots in the first figure by 49

8 0
3 years ago
Other questions:
  • You can use Facebook's live feed tool to broadcast content as you post it
    8·2 answers
  • Jennifer’s company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting
    7·1 answer
  • You can italicize a word by selecting it and clicking the italics icon. what keyboard shortcut could you use instead of clicking
    12·2 answers
  • Select the Navy Admiral who invented a high-level programming language FLOW-MATIC in 1953.
    7·1 answer
  • Continuous data
    13·1 answer
  • Uses of prototype and who made the prototype<br>​
    5·1 answer
  • Use the function random.randint to write a program that rolls a 6-sided die 100 times, and prints out all of the rolls.
    8·1 answer
  • Global address list characteristics
    11·1 answer
  • Which IDEs support multiple high-level programming languages? Select all that apply.
    13·1 answer
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!