Suggested Answer:A🗳️
Controlling access by a subject (an active entity such as individual or process) to an object (a passive entity such as a file) involves setting up access rules. These rules can be classified into three access control models: Mandatory, Discretionary, and Non-Discretionary. An access matrix is one of the means used to implement access control. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 33.
According to Gemini, it's A
To control access to objects by subjects, you need to set up A. Access Rules.
Here's why:
Access Rules: These are specific policies that define who (subjects) can do what (actions) to which resources (objects). They are the fundamental mechanism for controlling access.
Access Matrix: While an access matrix is a useful tool for visualizing and managing access relationships, it's not a mechanism for controlling access directly. It's a data structure that represents who can do what to what.
Identification controls: These are used to verify the identity of subjects (e.g., through usernames and passwords). They are important for ensuring that only authorized subjects can access resources, but they don't directly control access.
Access terminal: This is a physical device used to access a system. It's not a mechanism for controlling access.
Therefore, the correct answer is A. Access Rules.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
PolyDork
2 months, 2 weeks agob722029
4 months, 1 week agospiritxxx0
5 months, 4 weeks ago