Another name for the Trusted Network Interpretation is:
a. The Red Book
b. The Orange Book
c. SEI-CMMI
d. SSE-CMM
A security manager needs to simplify how user permissions are managed. The security manager should consider using:
a. Discretionary access control (DAC)
b. Mandatory access control (MAC)
c. Role-based access control (RBAC)
d. Authentication, authorization, and accounting (AAA)
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here