Pete has obtained a highly sensitive document and has placed it on a network drive which has been formatted with NTFS and is shared via CIFS. Which of the following access controls apply to the sensitive file on the server?
A.
Discretionary
B.
Rule based
C.
Role based
D.
Mandatory