Suggested Answer:of the software code or uses attributes of the code. Answer: C is incorrect. In declarative security, authentication decisions are coarse-grained in nature from an🗳️
Declarative security applies the security policies on the software applications at their runtime. In this type of security, the security decisions are based on explicit statements that confine security behavior. Declarative security applies security permissions that are required for the software application to access the local resources and provides role-based access control to an individual software component and software application. It is employed in a layer that relies outside operational or external security perspective.
The following statements that are true about declarative security are:
A. It is employed in a layer that relies outside of the software code or uses attributes of the code.
B. It applies the security policies on the software applications at their runtime.
Therefore, options A and B are correct answers.
Option C is incorrect because authentication decisions based on business logic describe Context-Dependent Access Control (CDAC).
Option D is incorrect because Declarative Security states policy requirements without specifying how to accomplish them, which means they provide no specific rules for implementing enforcement mechanisms.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
74gjd_37
5 months, 2 weeks ago