Answer:
The correct answer will be "Mandatory access control".
Step-by-step explanation:
- MAC seems to be a security standard protocols limited by the designation, initialization including verification of the systems. These policies and configurations are implemented through one centralized controller and therefore are accessible to the system admin.
- MAC establishes and maintains a centralized implementation of sensitive requirements in information security.