Question 6: What is the purpose of creating and applying method lists for authorization? Choice: (choose correct answer): () To control what actions a user is allowed to perform after logging in. () To verify the identity of a user before granting access. () To encrypt data being transmitted over the network. () To monitor network traffic for suspicious activity. Answer: To control what actions a user is allowed to perform after logging in.