In which access control model does access to resources depend on the user's identity?
Discretionary Access Control (DAC)
Role-Based Access Control (RBAC)
Overlook minor misbehaviors
Impose harsh punishments for any infraction

Information Security Exercises are loading ...