Question: After a user has been authenticated ( identified ) , then the security tool access control can be employed. An _ _ _ _ _
After a user has been authenticated identified then the security tool access control can be employed. An is a list which specifies the type of functions a user is allowed to have, like read or write data. Sometimes these functions are assigned by a users like Admin, which makes it easier to manage access control.
Group of answer choices
ACL, role
RBAC, ACL
ACL, RBAC
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
