Access Control is implemented in layers. Each layer builds upon the one that precedes it. Identify
three correct statements about precedence of access control layers. (Choose three.)
A.
Data Security precedes Functional Security.
B.
Data Security precedes Role-Based Access Control.
C.
Delegated Administration precedes Registration Processes.
D.
Registration Processes precedes Self Service and Approvals.
E.
Self Service and Approvals precedes Role-Based Access Control.