An administrator uses a server with a trusted OS and is configuring an application to go into production
tomorrow, In order to make a new application work properly, the administrator creates a new policy that labels
the application and assigns it a security context within the trusted OS. Which of the following control methods is
the administrator using by configuring this policy?
Time based access control
Mandatory access control
Role based access control
Rule based access control