What method of securing an IT system uses permissions settings? Choose the answer.
Question 1 options:
Restricting access
Setting up system redundancy
Updating software
Installing an antimalware program
1 answer
Restricting access