SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start


From course:

CISSP

» Start this Course
(Practice similar questions for free)
Question:

Temporal isolation. AKA time-based access control is often used in conjunction with other authentication methods, particularly role-based access control (RBAC).

Author: John Intindolo



Answer:

What technique is used to extend the capability of a role-based access control mechanism? - Temporal isolation - Scrubbing - Polyinstantiation - Asset valuation


0 / 5  (0 ratings)

1 answer(s) in total