An organization's IT department wants to enforce a policy where all software installations and updates can only be performed by administrators. This is an example of which type of security policy mechanism?
- Administrative Access Control
- Discretionary Access Control (DAC)
- Mandatory Access Control (MAC)
- Role-Based Access Control (RBAC)
This policy is an example of Role-Based Access Control (RBAC). RBAC is a security mechanism that restricts system access to authorized users or processes based on their roles and responsibilities within the organization. It is commonly used to delegate software installations and updates to administrators.
Loading...
Related Quiz
- When a policy violation occurs, the CSP can be configured to send a report to a specified URI using the _______ directive.
- An organization's proactive approach to anticipate and respond to future security incidents is termed as _______ management.
- Sarah, a web security analyst, receives a report that a certain page on the company's website is vulnerable to an XSS attack. She decides to implement a CSP. Which of the following directives should she prioritize to mitigate this specific threat?
- Which of the following is a benefit of encrypting an individual file rather than an entire disk?
- When performing ethical hacking, what permission level should the hacker ideally have?