Fill in the blankComputer SecurityRole hierarchies make use of the concept of __________ to enable one role to implicitly include access rights associated with a subordinate role.
Role hierarchies make use of the concept of __________ to enable one role to implicitly include access rights associated with a subordinate role.
If the answers is incorrect or not given, you can answer the above question in the comment box. If the answers is incorrect or not given, you can answer the above question in the comment box.