Pete has obtained a highly sensitive document and has placed it on a network drive which has
been formatted with NTFS and is shared via CIFS. Which of the following access controls apply to
the sensitive file on the server?
A.
Discretionary
B.
Rule based
C.
Role based
D.
Mandatory