Identify what implementation method(s) can be used to incorporate multilayer access control.

  • Identify what implementation method(s) can be used to incorporate multilayer access control.
  • Describe and how each method benefits multilayered access control.