Access Control techniques do not include which of the following choices?

A.
Relevant Access Controls
B.
Discretionary Access Control
C.
Mandatory Access Control
D.
Lattice Based Access Control
Explanation:
Relevant Access Controls are not included as a Access Control Technique. Lattice-based access
control models were developed in the early 1970s to deal with the confidentiality of military
information. In the late 1970s and early 1980s, researchers applied these models to certain integrity
concerns. Later, application of the models to the Chinese Wall policy, a confidentiality policy unique
to the commercial sector, was demonstrated. Discretionary control is the most common type of
access control mechanism implemented in computer systems today. The basis of this kind of securityis that an individual user, or program operating on the user’s behalf, is allowed to specify explicitly
the types of access other users (or programs executing on their behalf) may have to information
under the user’s control. Discretionary Access control security differs from mandatory access control
security in that it implements the access control decisions of the user. Mandatory controls are driven
by the results of a comparison between the user’s trust level or clearance and the sensitivity
designation of the information.