List of questions
Related questions
Question 443 - CISSP discussion
A user sends an e-mail request asking for read-only access to files that are not considered sensitive. A Discretionary Access Control (DAC) methodology is in place. Which is the MOST suitable approach that the administrator should take?
A.
Administrator should request data owner approval to the user access
B.
Administrator should request manager approval for the user access
C.
Administrator should directly grant the access to the non-sensitive files
D.
Administrator should assess the user access need and either grant or deny the access
Your answer:
0 comments
Sorted by
Leave a comment first