which provides the most granular access to protected objects?

Choose the access control method which provides the most granular access to protected objects?

Choose the access control method which provides the most granular access to protected objects?

A.
Capabilities

B.
Access control lists

C.
Permission bits

D.
Profiles



Leave a Reply 0

Your email address will not be published. Required fields are marked *