John’s organization follows a hierarchical approach to data access, with IT personnel having full access, engineering personnel having slightly lesser access and managers having access to only their own department files. Which of the following access control models is in use?
  1. DAC
  2. DBAC
  3. MAC
  4. RBAC
Explanation
Answer: D- To follow a hierarchical approach of access to information, RBAC should be used.

Key Takeaway: RBAC is used in this case. RBAC is a type of control wherein the levels of security closely follow the structure of an organization. The role the person plays in the organization corresponds to the level of security access they have to data.
Was this helpful? Upvote!
Login to contribute your own answer or details

Top questions

Related questions

Most popular on PracticeQuiz