The most common approach to file protection is to make access dependent upon the identity of the user.
A.正确
B.错误
正确答案是A