Question: How are permissions implemented in MySQL?

  1. encrypted algorithms
  2. access control lists
  3. user settings
  4. administrator schema

Answer: The correct answer of the above question is Option B:access control lists