Effective CISSP Questions

You are implementing an authorization mechanism based on the state machine model to prevent privilege propagation and control information flow for confidentiality. Which of the following is the best mechanism to meet the security requirements? (Wentz QOTD)
A. Identity-based access control
B. Attribute-based access control
C. Role-based access control
D. Lattice-based access control

Read more of this post

Wentz Wu | October 26, 2021 at 5:09 pm | Categories: QOTD, Technology, 每日一題 | URL: https://wp.me/p2X0VJ-8U3
Comment