When a user tries to perform an action in an RBAC system, what check does the system perform to decide if access is allowed?
Whether the user knows the database password
Whether the user’s IP address is static
Whether the user has been online for more than an hour
Whether the user’s assigned role includes the required permission for that action
This question is part of this quiz :
Role-Based Access Control