Tag: Which of the following statements are true of access control lists (acls)?