Ask Question
25 December, 12:58

What is the most secure method for controlling privileged access to a system available for use in a public area? a. Database viewsb. Mandatory Access Control (MAC) c. Role-Based Access Control (RBAC) d. Constrained user interfaces

+2
Answers (1)
  1. 25 December, 13:22
    0
    Constrained user interfaces is the correct answer to the following question.

    Explanation:

    Because Constrained user interfaces are the secured function that is used for controlling the access of the user to the computer system and also confines the user to access the data but they can access only that data for which they are not restricted. In other words, Constrained user interfaces is that type of restriction for those users who access your data or resources and they can access only that part of data for which they are allowed.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “What is the most secure method for controlling privileged access to a system available for use in a public area? a. Database viewsb. ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers