A systems administrator needs to implement an access control scheme that will allow an object's access policy to be determined by its owner.
Which of the following access control schemes BEST fits the requirements?
A.
Role-based access control B.
Discretionary access control C.
Mandatory access control D.
Attribute-based access control.
B.
A systems administrator needs to implement an access control scheme that will allow an object's access policy to be determined by its owner.
Which of the following access control schemes BEST fits the requirements?
A.
Role-based access control
B.
Discretionary access control
C.
Mandatory access control
D.
Attribute-based access control.
B.
The access control scheme that BEST fits the requirement of allowing an object's access policy to be determined by its owner is Discretionary Access Control (DAC), option B.
Discretionary Access Control (DAC) is a type of access control model that allows the owner of an object (such as a file, folder, or resource) to determine who has access to that object and what level of access they have. In a DAC model, the owner of an object can grant or restrict access to the object as they see fit.
The other access control models are:
Therefore, out of the four access control schemes listed, Discretionary Access Control (DAC) is the one that allows the owner of an object to determine its access policy and is the best fit for the given requirements.