Which technique can safely be used to determine the cause of “insufficient privilege or file
protection violation” errors?

A.
temporarily grant the user all privileges
B.
enable audit alarms for all access failures on the object
C.
temporarily modify the object protection to W:RWED
D.
enable auditing for “use of privilege” events