209k views
5 votes
Which of the following access methods should you recommend if the technique to be used is one that is primarily based on preestablished access and can't be changed by users?

A. MAC
B. DAC
C. RBAC
D. Kerberos

1 Answer

4 votes

Final answer:

The recommended access method for preestablished access techniques that cannot be changed by users is MAC (Mandatory Access Control).

Step-by-step explanation:

If the technique to be used is primarily based on preestablished access and cannot be changed by users, the recommended access method would be MAC (Mandatory Access Control).

MAC is a security model where access controls are predetermined by administrators or the system itself. Users do not have the ability to change these access controls, ensuring a high level of security and preventing unauthorized access.

For example, in a military organization, where different levels of classified information exist, MAC can be used to restrict access to certain information based on security clearances.

User Injecto
by
7.5k points