Watch this video on YouTube
In an organization that uses both DAC and MAC, which security mechanism takes precedence?