An administrator uses a server with a trusted OS and is configuring an application to go into production
tomorrow, In order to make a new application work properly, the administrator creates a new policy that labels
the application and assigns it a security context within the trusted OS. Which of the following control methods is
the administrator using by configuring this policy?
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
Time based access control
B.
Mandatory access control
C.
Role based access control
D.
Rule based access control