ABC.com uses EMC Centera to archive several different types of documents managed by different
applications. They have developed a new application that will need to read the objects belonging
to the other applications but will not need to write to the EMC Centera.
Which EMC Centera security feature should the application developers use to provide access to
the objects for the new application?

A.
Access Control Lists
B.
Virtual Pools
C.
Compliance Edition Plus
D.
Profiles