Role-based access control
Role-based access control gives each user an array of permissions based on their position in the organization, such as the scheme shown here. Task-based access control is not a standard approach. Rule-based access controls use rules that apply to all subjects, which isn't something we see in the list. Discretionary access control gives object owners rights to choose how the objects they own are accessed, which is not what this list shows.
Alternate answers seen on other CBTs
The same question shows up worded slightly differently across CBT versions. Here are the other answer variants we've indexed.
✔Access is based on roles individuals have within the organization ✔Users are assigned roles which have been assigned various privileges needed to perform that role ✔There is no way to limit Role-Based Access
Cisa Doshi →an extension to the X. 509 specification that allows users to specify additional host names for a single SSL certificate.
Comptia Exam Objectives Security+ →