Which two of the following file access rule criteria can you use to allow or deny the operations that
the selected applications can perform on files? (Choose two.)
A.
the application attempting to access the service or address
B.
the address with which a system is attempting to communicate
C.
the operation attempting to act on the file
D.
the direction of the communications
E.
the application attempting to access the file