What are the incorrect methods of revocation of access rights?
(a) Immediate/Delayed
(b) Selective/General
(c) Partial/total
(d) Crucial
This question was posed to me during an online exam.
My question is based upon Protection topic in section Protection of Operating System