a. Rule-Based Accessing Control |
b. Role-Based Access Control |
c. Rule-Based Access Control |
d. Role-Based Accessing Control |
Answer: Role-Based Access Control |
a. Rule-Based Accessing Control |
b. Role-Based Access Control |
c. Rule-Based Access Control |
d. Role-Based Accessing Control |
Answer: Role-Based Access Control |