MAC access control is based on what?
A: Labels and clearance.
B: The discretion of the object owner.
C: The job role of the user.
D: IF/THEN statements.
CBK 5: Identity and Access Management
Source: ThorTeaches.com practice tests
A: MAC (Mandatory Access Control): Often used when Confidentiality is most important. Access to an object is determined by labels and clearance, this is often used in the military or in organizations where confidentiality is very important.
IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.