It is vital that access controls protecting a computer system work together. Which access controls should be most specific?
a. Physical access controls
b. Application system access controls
c. Operating system access controls
d. Communication system access controls