Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
Explain the Role Based Access Control
+1
vote
118
views
asked
Feb 27
in
Computer Networks
by
(user.guest)
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
1
Answer
+1
vote
answered
Feb 27
by
(user.guest)
selected
Mar 5
by
(user.guest)
Best answer
In this type of access control, permission is granted based on the role you occupy, so a process or resource out of ones job description within the organization will be denied access.
Your comment on this answer:
Improve the existing answer with your comment.
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
To avoid this verification in future, please
log in
or
register
.
Related questions
+1
vote
1
answer
103
views
What are some advantages of Role Based Access Control type
asked
Feb 27
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
112
views
What is the role of access control as it relates to cyber security
asked
Feb 27
in
Computer Networks
by
(user.guest)
0
votes
1
answer
3.0k
views
What is meant by a control plane that is based on logically centralized control? In such cases, are the data plane and the control plane implemented within the same device or in separate devices? Explain.
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
86
views
Explain the Mandatory Access Control (MAC)
asked
Feb 27
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
132
views
Explain the DAC type of access control
asked
Feb 27
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
102
views
How would you explain the term Access control
asked
Feb 27
in
Computer Networks
by
(user.guest)
0
votes
1
answer
1.9k
views
Describe the main role of the communication layer, the network-wide state-management layer, and the network-control application layer in an SDN controller.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
2.5k
views
What is meant by a control plane that is based on per-router control? In such cases, when we say the network control and data planes are implemented "monolithically." what do we mean?
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
115
views
Advantages of the MAC access control
asked
Feb 27
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
140
views
What are the goals of access control cyber security
asked
Feb 27
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
510
views
What is MAC address? Explain the role of address resolution protocol(ARP)
asked
Nov 27, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
1.2k
views
Suggest circumstances where it is appropriate to use a fault-tolerant architecture when implementing a software-based control system and explain why this approach is required.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
129
views
What are some types of Access control we have
asked
Feb 27
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
129
views
What are some Access Control principles to keep in mind when incorporating them in an organization
asked
Feb 27
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
2.2k
views
Suppose you can access the caches in the local DNS servers of your department. Can you propose a way to roughly determine the Web servers (outside your department) that are most popular among the users in your department? Explain.
asked
Sep 25, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
2.4k
views
Giving reasons for your answer based on the type of system being developed, suggest the most appropriate generic software process model that might be used to develop a system that automatically controls the speed of a motor vehicle (cruise control).
asked
Apr 3, 2020
in
Software Engineering
by
(user.guest)
+1
vote
1
answer
166
views
Explain the role of Expansion Slots.
asked
Sep 16, 2021
in
Computer Architecture
by
anonymous
+1
vote
1
answer
436
views
Explain the role of entrepreneur in national development of Zambia
asked
May 29, 2021
in
Artificial Intelligence
by
anonymous
0
votes
1
answer
290
views
What is the role of “core network” in the 3G cellular data architecture
asked
Dec 26, 2021
in
Computer Networks
by
(user.guest)
0
votes
1
answer
1.3k
views
What is the role of the anchor MSC in GSM networks?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
1.2k
views
What is the role of the eNodeB, MME, P-GW, and S-GW in 4G architecture?
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
930
views
What is the role of the RNC in the 3G cellular data network architecture? What role does the RNC play in the cellular voice network?
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
1.7k
views
Describe the role of the beacon frames in 802.11.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
3.1k
views
What is the role of the forwarding table within a router?
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
811
views
With the help of examples, explain in details the concept and process of Value Based Software Engineering.
asked
Apr 22
in
Software Engineering
by
anonymous
0
votes
0
answers
146
views
A definition of computer architecture is built on four basic viewpoints namely the structure, the organization, the implementation, and the performance. Explain each one of the list viewpoints based on computer architecture
asked
Mar 28
in
Computer Architecture
by
anonymous
+1
vote
0
answers
230
views
Explain why the risk-based approach is interpreted in different ways when specifying safety and security
asked
Apr 2, 2021
in
Software Engineering
by
anonymous
0
votes
0
answers
562
views
Explain why it is essential that every version of a component should be uniquely identified. Comment on the problems of using a version identification scheme that is simply based on version numbers
asked
Nov 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.2k
views
Explain why the environment in which a computer-based system is installed may have unanticipated effects on the system that lead to system failure.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
468
views
With reference to the Processor performance equation, explain how both the RISC and CISC based computer architectures designs seek to increase processor performance.
asked
Aug 23, 2019
in
Computer Architecture
by
anonymous
0
votes
1
answer
777
views
Signature-based IDSs and IPSs inspect into the payloads of TCP and UDP segments. True or False?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
434
views
Is the message integrity scheme based on HMAC susceptible to playback attacks? If so, how can a nonce be incorporated into the scheme to remove this susceptibility?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
3.1k
views
What is meant by the "match plus action" operation of a router or switch? In the case of destination-based forwarding packet switch, what is matched and what is the action taken?
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
70
views
Explain the different file access methods
asked
May 7
in
Compilers & Operating Systems
by
(user.guest)
–1
vote
1
answer
610
views
Duplicate: Explain the difference between direct access memory and sequential access
asked
Oct 28, 2020
in
Computer Architecture
by
anonymous
+2
votes
1
answer
743
views
Explain the various access rights that can be provided to users to access a file
asked
Oct 13, 2019
in
Compilers & Operating Systems
by
anonymous
–1
vote
1
answer
205
views
Duplicate: In Multinational companies what kind of cable type used to access the internet? Justify your answer.
asked
Nov 24, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
840
views
In Multinational companies what kind of cable type is used to access the internet. Justify your answer.
asked
Nov 22, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
3.2k
views
Describe the most popular wireless Internet access technologies today. Compare and contrast them.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
2.4k
views
Dial-up modems, HFC, DSL and FTTH are all used for residential access. For each of these access technologies, provide a range of transmission rates and comment on whether the transmission rate is shared or dedicated.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
4.3k
views
What are the most popular wireless Internet access technologies today
asked
Oct 31, 2019
in
Computer Networks
by
anonymous
+1
vote
1
answer
2.8k
views
What are the four residential access technologies available in a city at a particular point of time
asked
Oct 31, 2019
in
Computer Networks
by
anonymous
+1
vote
1
answer
2.7k
views
What are the six access technologies in networking
asked
Oct 31, 2019
in
Computer Networks
by
anonymous
0
votes
1
answer
141
views
Explain the internal locus of control
asked
Nov 5, 2021
in
Others
by
(user.guest)
+1
vote
1
answer
1.1k
views
Explain what is meant by “inversion of control” in application frameworks. Explain why this approach could cause problems if you integrated two separate systems that were originally created using the same application framework.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
84
views
What could happen if a receiver tries to control the bursts from the transmitter by delaying sending acknowledgments until it has enough empty buffers?
asked
Apr 20
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
73
views
Why is the TCP congestion control algorithm not appropriate for Ad-Hoc Networks? Briefly describe how the Ad-Hoc Transmission Control Protocol (ATCP) works.
asked
Apr 14
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
3.2k
views
We noted that network layer functionality can be broadly divided into data plane functionality and control plane functionality. What are the main functions of the data plane? Of the control plane?
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
3.0k
views
True or false? Consider congestion control in TCP. When the timer expires at the sender, the value of ssthresh is set to one half of its previous value.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
280
views
Use the Internet to find the RFC for the Transmission Control Protocol (TCP)
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...