Choose the access control method which provides the most granular access to protected objects?
A.
Profiles
B.
Capabilities
C.
Access control lists
D.
Permission bits
Explanation:
Access control lists enable devices in your network to ignore requests from specified users or
systems, or grant certain network capabilities to them. ACLs allow a stronger set of access
controls to be established in your network. The basic process of ACL control allows the
administrator to design and adapt the network to deal with specific security threats.
Reference:
Mike Pastore and Emmett Dulaney , Security+ Study Guide , 2nd Edition, Alameda , Sybex ,
2004, p 235