header bg

Scan QR code or get instant email to install app

Question:

Frankie is a security administrator for a large company. Occasionally, a user needs to access a specific resource that they don’t have permission to access. Which access control methodology would be most helpful in this situation?

A Rule-based access control.
explanation

Rule-based access control evaluates access requests against a specific set of rules. Depending on how the rules are applied, a user may be granted access to a particular resource that they were not explicitly authorized to access. In contrast, MAC, DAC, and role-based access control require explicit permission before granting access to a user.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*