An organization's new software automatically adjusts user permissions based on their job role and revokes access to certain files when an employee changes departments. This approach to managing user rights is an example of what?
- Attribute-Based Access Control (ABAC)
- Discretionary Access Control (DAC)
- Mandatory Access Control (MAC)
- Role-Based Access Control (RBAC)
This approach to managing user rights is an example of "Role-Based Access Control (RBAC)." RBAC assigns permissions based on a user's role or job function, simplifying permission management and reducing the risk of unauthorized access.
Loading...
Related Quiz
- After a ransomware attack, a company realizes they have lost access to their critical data. Fortunately, they have a recent backup stored in a remote location. This situation highlights the importance of which data protection principle?
- A hospital's electronic record system was breached, exposing patient records. The hospital is based in the United States. Which regulation mandates that the hospital notify affected patients of the breach?
- Which of the following is NOT a recommended practice to prevent SQL injection?
- Which stage of security incident response is focused on eradicating the root cause of the incident?
- The HIPAA Security Rule focuses specifically on the security of _______.