Ask Question
Yesterday, 20:38

What is the most secure method for controlling privileged access to a system available for use in a public area? a. Database viewsb. Mandatory Access Control (MAC) c. Role-Based Access Control (RBAC) d. Constrained user interfaces

+4
Answers (1)
  1. Yesterday, 20:58
    0
    Constrained user interfaces is the correct answer to the following question.

    Explanation:

    Because Constrained user interfaces are the secured function that is used for controlling the access of the user to the computer system and also confines the user to access the data but they can access only that data for which they are not restricted. In other words, Constrained user interfaces is that type of restriction for those users who access your data or resources and they can access only that part of data for which they are allowed.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question ✅ “What is the most secure method for controlling privileged access to a system available for use in a public area? a. Database viewsb. ...” in 📘 Computers and Technology if you're in doubt about the correctness of the answers or there's no answer, then try to use the smart search and find answers to the similar questions.
Search for Other Answers