which techniques are used to control access? seenagape 10 years ago When setting up the disk and file structures for user data, which techniques are used to controlaccess? Select TWO. A. highwater marking B. rooted logical names C. disk quotas D. protection masks E. Access Control Lists ← Previous question Next question →