Watch this video on YouTube
In an IT environment, Bob, a network administrator, wants to access server logs to diagnose a network issue. In terms of access control, how would Bob and the server logs be classified?