Of the following, the BEST method for ensuring that temporary employees do not receive excessive access rights is:

A.
mandatory access controls.
B.
discretionary access controls.
C.
lattice-based access controls.
D.
role-based access controls.
Explanation:
Role-based access controls will grant temporary employee access based on the job function to be performed. This provides a better means of ensuring that the access is not more or less than what is required. Discretionary, mandatory and lattice-based access controls are all security models, but they do not address the issue of temporary employees as well as role-based access controls.
I choose D
0
0