FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
can you set different levels of access to control who sees your information on your personal computer?
A
yes
B
no
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -Three main types of access control systems are: Discretionary Access Control (DAC), Role Based Access Control (RBAC), and Mandatory Access Control (MAC).

Detailed explanation-2: -There are five main access control systems or models defined under different terms. Generally, the choice of models includes role-based access control, rule-based access control, discretionary access control, mandatory access control, and attribute-based access control.

Detailed explanation-3: -In its simplest form, access control involves identifying a user based on their credentials and then authorizing the appropriate level of access once they are authenticated. Passwords, pins, security tokens-and even biometric scans-are all credentials commonly used to identify and authenticate a user.

There is 1 question to complete.