a linux security administrator wants to use a built in tool to implement an os security mechanism that enforces access rules based on privileges for interactions between processes, files, and users.