Which security technique uses a list of permit and deny statements in a security device? Understanding and Maintaining Cloud Security Which security technique uses a list of permit and deny statements in a security device? A. Zoning B. Masking C. ACL D. Authentication Answer: ACL (Access Control List) Learn More : Share this Share on FacebookTweet on TwitterPlus on Google+