This is a dedicated watch page for a single video.
As the IT security manager of ThorTeaches.com, you need to determine the best method for controlling employee access to various systems and resources. Which of the following is a security model that controls access to objects based on the user's identity and the level of permission they have been granted?