With Rule Based Security Policy, global rules usually rely on comparison of the _______ of the
resource being accessed.
A.
A group of users.
B.
Users
C.
Sensitivity
D.
Entities
Explanation:
The RFC 2828 – Internet Security Glossary talks about Rule Based Security Policy: A
security policy based on global rules imposed for all users. These rules usually relyon comparison of the sensitivity of the resource being accessed and the possession of
corresponding attributes of users, a group of users, or entities acting on behalf of
users.