An administrator uses a server with a trusted OS and is configuring an application to go into production
tomorrow, In order to make a new application work properly, the administrator creates a new policy that
labels the application and assigns it a security context within the trusted OS. Which of the following
control methods is the administrator using by configuring this policy?

A.
Time based access control
B.
Mandatory access control
C.
Role based access control
D.
Rule based access control
MAC uses labels and classifications.
0
0
I agree with your answer
0
0