35. You work as the network administrator at Certkiller.com. The Certkiller.com network uses the RBAC (Role Based Access Control) model. You must plan the security strategy for users to access resources on the Certkiller.com network. The types of resources you must control access to are mailboxes, and files and printers. Certkiller.com is divided into distinct departments and functions named Finance, Sales, Research and Development, and Production respectively. Each user has its own workstation, and accesses resources based on the department wherein he/she works. You must determine which roles to create to support the RBAC (Role Based Access Control) model. Which of the following roles should you create?
A. Create mailbox, and file and printer roles.
B. Create Finance, Sales, Research and Development, and Production roles.
C. Create user and workstation roles.
D. Create allow access and deny access roles.