Which of the following statements best describes the level of detail Lisa should include with the risk responses she has created?
Which of the following access control models uses a predefined set of access privileges for an object of a system?