Which two of the following network access rules can you use to control access to specified
network services? (Choose two.)
A.
the application attempting to access the service or address
B.
the application attempting to access the file
C.
the operation attempting to act on the file
D.
the direction of the communications