answersLogoWhite

0


Best Answer

DAC - Discretionary Access Control.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar
More answers
User Avatar

Anonymous

Lvl 1
4y ago

categorization access control

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Restricting access to files based on the indentity of the user or group is an example of which on what?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Compare and contast controlled media access and contention-based media access control?

Controlled-based media access control is based upon having a system in place for allowing one host to transmit at a time. It is also known as deterministic method since there is a process to determine which host transmits at a certain time. No collisions exist with this type of media access control. An example would be token ring where a token is passed from host to host and when it has the token it can transmit and others do not transmit at that time. Contention-based media access control is known as non-deterministic because hosts can transmit whenever they want. CSMA/CD is an example of this. Collisions do exist.


Can you get the circuit diagram of Fingerprint based access control system?

Yes. You can get the circuit diagram of Fingerprint based access control system.


Did the Congress pass laws restricting immigration and setting quotas?

Yes, the Congress has passed laws restricting immigration and setting quotas. One significant example is the Immigration Act of 1924, also known as the Johnson-Reed Act, which established numerical limits on immigration based on nationality. These quotas heavily favored immigrants from Western and Northern European countries while limiting immigration from other regions, such as Asia and Eastern Europe.


Restricting immigrants from entering a country may be based on what belief?

It may stem from nationalism, xenophobia, fear of competition for resources, and/or a fear that the existing culture will be destroyed.


What form of access control is based on access control lists that define which users can access objects?

the passive entity that is the target of an access request. the active entity that initiates an access request.


What is the full form of RBAC?

Role Based Access Control


Is it illegal to refuse access to a store based solely on the age of said person?

I believe it would be illegal to prejudice someone based on their age, although this is seen all the time for example, clubs often refuse entry to people they deem too old to enter


What is known as the access point device that also functions as a point coordinator?

In Priority-Based Access, the access point device also functions as a point coordinator


Which acces control is based on a security labeling system?

Mandatory Access List


Are gays and lesbians in Mexico protected by law against discrimination on the basis of sexual orientation?

Absolutely. Since June 11 2003, Mexico has had this amazingly comprehensive anti-discrimination law. It is illegal in Mexico to discriminate on the basis of sexual preference by:"Impeding access to public or private education; prohibiting free choice of employment, restricting access, permanency or promotion in employment; denying or restricting information on reproductive rights; denying medical services; impeding participation in civil, political or any other kind of organizations; impeding the exercise of property rights; offending, ridiculing or promoting violence through messages and images displayed in communications media; impeding access to social security and its benefits; impeding access to any public service or private institution providing services to the public; limiting freedom of movement; exploiting or treating in an abusive or degrading way; restricting participation in sports, recreation or cultural activities; incitement to hatred, violence, rejection, ridicule, defamation, slander, persecution or exclusion; promoting or indulging in physical or psychological abuse based on physical appearance or dress, talk, mannerisms or for openly acknowledging one's sexual preferences."


What major company designed Network Access Protection?

A policy based management is used to simplify the management by establishing policies. Network Access Protection or NAP is a policy based management of Windows server 2008. This allows a Network Administer to control the access to network resources.


What can we do in dos based c and that we can't in windows based c?

Access the hardware directly: possible in DOS, not possible in Windows.