The following is an access verification technique, listing several files and the access allowed for a single use. Identify the control...
jesycoThe following is an access verification technique, listing several files and the access allowed for a single use.
Identify the control technique used here and for each, explain the type of access allowed.
a. File_1 R-E-
b. File_12 RWE
c. File_13 RW--
d. File_14 --E-
2.
. The following is an access verification technique, listing several users and the access allowed for File_13. Identify the control technique used here and for each and explain the type of access allowed.
Finally, describe who is included in the WORLD category.
a. User_10 --E-
b. User_14 RWED
c. User_17 RWE-
d. WORLD R---
- 9 years ago
- 10
Answer(0)
Bids(0)