GIAC Certified Incident Handler GCIH Question # 29 Topic 3 Discussion

GIAC Certified Incident Handler GCIH Question # 29 Topic 3 Discussion

GCIH Exam Topic 3 Question 29 Discussion:
Question #: 29
Topic #: 3

Which of the following controls is described in the statement given below?

"It ensures that the enforcement of organizational security policy does not rely on voluntary web application user compliance. It secures information by assigning sensitivity labels on information and comparing this to the level of security a user is operating at."


A.

Role-based Access Control


B.

Attribute-based Access Control


C.

Discretionary Access Control


D.

Mandatory Access Control


Get Premium GCIH Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.