Correct option is B
Share-level Security is commonly used in peer-to-peer networks, where access control is managed at the resource or share level. In this model, users control access by assigning a password to shared resources, rather than creating individual user accounts or permissions.
Important Key Points:
1.
Resource-Based Security: Share-level security focuses on protecting individual resources rather than assigning permissions to specific users.
2.
Password Protection: Access is controlled by passwords rather than user credentials, which is simpler in a peer-to-peer environment.
3.
Limited User Management: Unlike centralized networks, peer-to-peer networks use simpler access controls like share-level security to manage permissions.
Knowledge Booster:
·
Password-protected shares: While similar, this specifically refers to password protection on individual shares but lacks the broader scope of a security model.
·
Access Control Lists (ACLs): ACLs are lists that define user permissions on a resource, used more in centralized networks than in peer-to-peer settings.
·
User-level Security: Common in client-server environments, where access is managed based on individual user accounts rather than resource-level passwords.
·
Access Control Entries (ACEs): These are entries in an ACL that specify individual permissions but are typically used in server-based networks, not in peer-to-peer models.