Question: After a user has been authenticated ( identified ) , then the security tool access control can be employed. An _ _ _ _ _

After a user has been authenticated (identified), then the security tool access control can be employed. An ________________ is a list which specifies the type of functions a user is allowed to have, like read or write data. Sometimes these functions are assigned by a users _____________, like Admin, which makes it easier to manage access control.
Group of answer choices
ACL, role
RBAC, ACL
ACL, RBAC

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!