a linux security administrator wants to use a built in tool to implement an os security mechanism that enforces access rules based on privileges for interactions between processes, files, and users.
a. true
b. false

Answer :

Other Questions