What is the purpose of an instruction developed to allow or deny access to a system by comparing the validated identity of the subject to an access control list?
1) To grant or restrict access to a system based on the subject's validated identity
2) To validate the identity of the subject accessing the system
3) To compare the subject's identity with an access control list
4) To develop instructions for accessing a system