The following is an access verification technique, listing several files and the access allowed for a single use. Identify the control...

profilejesyco

The following is an access verification technique, listing several files and the access allowed for a single use.

Identify the control technique used here and for each, explain the type of access allowed.

a. File_1        R-E-
b. File_12     RWE
c. File_13     RW--
d. File_14      --E-

 

2.

.     The following is an access verification technique, listing several users and the access allowed for File_13. Identify the control technique used here and for each and explain the type of access allowed. 
Finally, describe who is included in the WORLD category.

a.   User_10                 --E-

b.  User_14                 RWED

c.   User_17                 RWE-

d.  WORLD               R---

 

    • 9 years ago
    • 10
    Answer(0)
    Bids(0)