Choose the access control method which provides the most granular access to protected objects?
A.
Capabilities
B.
Access control lists
C.
Permission bits
D.
Profiles
Choose the access control method which provides the most granular access to protected objects?
Choose the access control method which provides the most granular access to protected objects?
A.
Capabilities
B.
Access control lists
C.
Permission bits
D.
Profiles