Bob needs to implement role-based access control (RBAC) within his company. Hehas learned that there are several approaches to RBAC. He needs to ensure that usersPage 2cess trol-P5.txtare mapped to multiple roles and mapped directly to other types of applications thatdo not have role-based access functionality. Which of the following should Bob choseto implement?
A.
Non-RBAC
B.
Limited RBAC
C.
Hybrid RBAC
D.
Full RBAC
Explanation:
The types of RBAC are outlined below;- Non-RBAC Users are mapped directly to applications and no roles are used.Page 8cess trol-P5.txt- Limited RBAC Users are mapped to multiple roles and mapped directly to other typesof applications that do not have role-based access functionality.- Hybrid RBAC Users are mapped to multi-application roles with only selected rightsassigned to those roles.- Full RBAC Users are mapped to enterprise roles.