1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
12

Which access control principle limits a user's access to the specific information required to perform the currently assigned tas

k
Computers and Technology
1 answer:
Svetradugi [14.3K]3 years ago
4 0

Answer:

The answer is "Need-To-Know Access Control Principle"

Explanation:

There are three types of access control methods such as Role-Based Access Control, Discretionary Access Control and Mandatory Access Control.

The access control principle that limits/blocks the user from gaining access to a folder/information/procedure within the system is called "Need-To-Know Access Control Principle".

I hope this answer helps.

You might be interested in
While conducting routine maintenance, you discover a network server that needs to
patriot [66]

Answer:

tell the truth and make other people aware of what is going on inorder for them to also be hands on deck and come up with solutions to also help solve the problem

3 0
2 years ago
Your organization's security policy specifies that any mobile device (regardless of ownership) that connects to your internal ne
Veseljchak [2.6K]

Answer:

Create an microsoft intune for remote management of the device

Explanation:

Microsoft intune is a server based management that grants an authorized user or group limited access to information in its database.

Setting up a intune in new acquired devices (it is called bulk enroll) is as easy as connecting a usb to the device and clicking install on the administrator PC. While already existing devices would have to create an account as individual users.

3 0
3 years ago
I need help ASAP Please! :)
amid [387]
Your parents,your school,google,your social media accounts
3 0
3 years ago
A command is
Alona [7]

Answer:

D

Explanation:

4 0
3 years ago
What are the benefits of open source software? Risks?
andrezito [222]

Answer:

more security

fewer bugs and faster fixes

no upgrade pushes

low coast

excellent support

as far as the risk part of it. I think that would be

the risk of license restriction, infringement.

5 0
3 years ago
Other questions:
  • Anna is making a presentation on the solar system. She wants to emphasize the planet names as they appear one by one on the pres
    11·1 answer
  • What are the nicknames for the first generation computers
    8·1 answer
  • Why are agorithms important?
    8·1 answer
  • In Windows applications, a ____ control is commonly used to perform an immediate action when clicked.a. text boxb. buttonc. wind
    7·1 answer
  • Should you configure if you want to limit access to files with certain classifications within a folder to a specific security gr
    13·1 answer
  • Which of the following statements applies to a proprietary software license? a. Purchased from a vendor and gives you the right
    5·1 answer
  • What does the opacity effect do
    8·2 answers
  • The interactive process through which people learn the basic skills, values, beliefs, and behavior patterns of a society.
    6·1 answer
  • A buffer is filled over a single input channel and emptied by a single channel with a capacity of 64 kbps. Measurements are take
    11·1 answer
  • Understanding that protection of sensitive unclassified information is:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!