HP Exam Questions

which techniques are used to control access?

When setting up the disk and file structures for user data, which techniques are used to control
access? Select TWO.

A.
highwater marking

B.
rooted logical names

C.
disk quotas

D.
protection masks

E.
Access Control Lists