Which of the following can help an administrator to implement a procedure to control inbound and outbound traffic on a network segment?
Which access control model uses Access Control Lists to identify the users who have permissions to a resource?
Which of the following refers to the ability to be reasonably certain that data is not disclosed to unintended persons?