What method of securing an IT system uses permissions settings? Choose the answer.

Question 1 options:

Restricting access

Setting up system redundancy

Updating software

Installing an antimalware program

1 answer

Restricting access